kouk

Members
  • Posts

    2
  • Joined

  • Last visited

kouk's Achievements

New User

New User (1/3)

  1. +1 from me as well. There are plenty of use cases where this would be helpful. Most important in my mind would be replicating data to read-only untrusted locations where it can be downloaded and decrypted even in the event of a local data loss. a quick question: what would happen if the read-only client didn't have the actual secret key but just the SHA2(Secret)? Could it make a request to receive encrypted data from the sync sources? Encrypted data which obviously it would not be able to decrypt.