User and key database
Once we have at least a plan for users (#40 (closed) ) and can verify them (#37 (closed) ) we should think about a nice way to store the identification and keys of those users on our system.
Once we have at least a plan for users (#40 (closed) ) and can verify them (#37 (closed) ) we should think about a nice way to store the identification and keys of those users on our system.