That depends on the opponent’s computational power. There are certainly cryptographic approaches to this problem.
That depends on the opponent’s computational power. There are certainly cryptographic approaches to this problem.