|
You are here |
box.matto.nl | ||
| | | | |
fedd.it
|
|
| | | | | [AI summary] The article explains the features and technical aspects of SimpleX Chat, including its use of blockchain, end-to-end encryption, and decentralized network principles for secure communication. | |
| | | | |
berty.tech
|
|
| | | | | You have probably already heard about cryptography and, more specifically, about end-to-end encryption. But do you know what it really is? | |
| | | | |
mikegerwitz.com
|
|
| | | | | [AI summary] The article discusses the importance of end-to-end encryption and the potential risks of government surveillance and backdoors. It highlights the role of free software, decentralization, and federation in ensuring user privacy and control over data. The author emphasizes the need for ongoing debate and awareness about encryption, privacy, and digital rights. | |
| | | | |
www.jeremykun.com
|
|
| | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | ||