Write a program that lets the user open a file containing encrypted rich text data, edit it, and save it in the same or another encrypted file.
Do not use the methods from the preceding solution because that would require the program to save unencrypted versions of the file on the computer where an attacker might find them, either while the program is running or later, if the program crashes and does not clean up temporary files correctly.