@soatok But that's why we love you. You summarize very well, in a way that is easy to understand if you're willing to look up the parts you don't get, and neither patronizingly oversimplified or arrogantly ignoring the complexity.
"Using the public key to verify" I mean, reading it I had this growing sense of horror...the whole thing sounds like a beginner's exercise in "inserting holes for us to exploit later..."
=> More informations about this toot | View the thread | More toots from tekhedd@byteheaven.net
=> View soatok@furry.engineer profile
text/gemini
This content has been proxied by September (3851b).