Maybe the second half of the class could be about designing a more secure system. Or use this dilemma to explain public-private key encryption.
Maybe the second half of the class could be about designing a more secure system. Or use this dilemma to explain public-private key encryption.