I am failing to see the point then I guess. How can it work without encryption? What are the hashpoints made from? Just the transaction data? There would be no way to verify the module that way. They would have to hash off the files then, right? But then the hash would fail if I modified the module wouldn't it? Like say fixed a typo in it, then it should fail, no?