But that a notional 'attacker' could use any implementation desired so long as the NCrypt implementation verifies the resulting signatures as 'okay' Also assume the attacker is smart but is not an ...