@bascule how do people these days apply Diffie-Hellman? How do they mitigate the MITM vulnerability?
-
-
-
@wilkieii NaCl provides mutual authentication every step of the way with Crypto::Box (which uses D-H to compute symmetric keys) -
@bascule it really is beautiful mathematics. -
@wilkieii yeah definitely, (a, b') == (b, a')! beautiful symmetry -
@bascule everybody who can should take a couple of hours and a sheet of paper and work out the math of symmetric keys. it is pretty.
End of conversation
New conversation -
-
-
@PatternGuru714
@hashbreaker I'm trying to write documentation in a way that's accessible to as wide an audience as possible. How'm I doin?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.