x2kpb - 2015-04-25

The issue of somebody being able to open up and tamper with data in an external document would be addressed through this additional feature. The tamper checker would work by generating a hash of the original, unencrypted document, and using this hash for comparison with generated hashes of the document when it is decrypted later. If the comparison does not match a flag, or notification can be raised to pass the information that the document has been tampered with.