This is a customer requirement.
Customer requirements must be projected into the real world.
If your application can read some business data, and if the aggregator takes control of your application, then the aggressor can read this business data.
Asymmetric cryptography will not do magic.
source share