1 Answers
hi Santosh, I did notice that. It appears that, in a previous version of the video, he may have stepped through with different users, and observed which user, with differing permissions on the specific-key, could copy and encrypt. It might be a good exercise to construct those examples yourself as an exercise. [… I may go through and do this myself … good eye!]