as a way to form the key, a hash function could be manufactured, or simply a random number created so that crucial sequence will not be predictable. Or end users could suggest their unique custom keys. For example, https://pennydalg140627.blogsmine.com/29277987/not-known-facts-about-raccourcir-url-microsoft