v0.4.5-rc1
Pre-release
Pre-release
do hash the shared secret generated to decrypt workloads sensitive information Extract from https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman#Key_establishment_protocol: While the shared secret may be used directly as a key, it can be desirable to hash the secret to remove weak bits due to the Diffie–Hellman exchange.