1 comment we did get a handful of times with regards to the article was that it could be much more detailed and maybe split up into superior types so we have invested a little much more time into carrying out this time. Anyway:Now that we possess the Constantly Encrypted keys and the schema configured, we can develop a small application that can in