This sounds basic when represented like above. But the most crucial concern is, how can we ensure that the encrypted info is browse correctly with the receiver? We want a way to exchange the keys securely. If our keys are uncovered, this protocol will become no a lot better than basic HTTP.Community Essential: Available to any individual connecting