• 0 Posts
  • 46 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle








  • Great question: it’s called asymmetric cryptography for a reason.

    The key pair is built by the person wanting to receive private messages. The public part is made public an can be used to encrypt messages to the owner of the private key. Without it you cant read the contents.

    As this method is not really performance friendly, thus method is usually used to establish a symmetric encryption key for both parties that can’t be intercepted this way.

    In fact: if the attacker can switch out the public key for his own during transfer, he can use it to decrypt the messages and relay them to the first party, thereby revealing all the messages. This is called a man-in-the-middle attack. This is why authentication of the key is so important. This is usually done via a trusted third party.

    Sorry to be so short, I hope I have given you enough words to Google for further reading.





  • There is so much misinformation here, it’s hard to know where to even start. Yes there are crypto scams, yes legacy technology consumes way too much energy.

    These are all solved problems, but it you only know about crypto from scams you might think there is nothing else. Crypto solves real problems with our current financial systems.

    Wouldn’t hurt to read from time to time. Solar Punk is as much about technology, as it is about knowledge.