You are here |
www.poberezkin.com | ||
| | | |
www.eff.org
|
|
| | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | |
gavinhoward.com
|
|
| | | | This is how I verify a safety number in Signal when I cannot verify it in person. | |
| | | |
duckrowing.com
|
|
| | | | ||
| | | |
dusty.phillips.codes
|
|
| | The venerable RSA public key encryption algorithm is very elegant. It requires a basic understanding of modular arithmetic, which may sound scary if you havent studied it. It reduces to taking the remainder after integer long division. The RSA Wikipedia article describes five simple steps to generate the keys. Encryption and decryption are a matter of basic exponentiation. Theres no advanced math, and its easy to understand their example of working with small numbers. |