On 26 June 2015 at 20:20, Mike Muske <
mike...@gmail.com> wrote:
> OK - thanks for confirming. For what it is worth, this is something that
> ultimately is steering us away from Keyczar because we would like to build a
> capability to re-key data in the event that a key is compromised.
This is, of course, exactly the point of Keyczar.
> We would
> like to be sure that all of our data that used a particular key has been
> re-keyed prior to deleting the key. In general, it seems that it would be
> useful to have access to key aliases that are used to encrypt/decrypt a
> particular piece of data.
Sure - there's definitely no reason not to add it - and that would
seem more sensible than building something completely new...