|
Nathan Stewart
Registered User
Join date: 2 Feb 2005
Posts: 1,039
|
05-13-2005 11:36
The inventory is sent to us at one time and then cached on our machines, only subsequent changes are streamed to our computers, it can be encrypted on our computer and an idea would be assign some kind of encryption key which could be compared at login to check for tampering, if this is invalid then the cache is updated and all data is overwritten.
|