Re: Benny
"if you have unauthorized database access then if the DB is unencrypted t's completely game over, "
If you have authorised access then you can decrypt it anyway presumably so what exactly is the point of this method?
"if you have unauthorized database access then if the DB is unencrypted t's completely game over, "
If you have authorised access then you can decrypt it anyway presumably so what exactly is the point of this method?