@matthew_d_green I went back to 2.0 to even try to get things to work. Now that I did I want to regenerate my keys... again...
-
-
@bascule@matthew_d_green the primitives for any asymmetric crypto are "sign/verify" and "encrypt/decrypt" -
@dvanduzer@matthew_d_green there are also signing subkeys in addition to auth subkeys! :o -
@dvanduzer@matthew_d_green also I don't make this stuff. I'm just trying to figure out how it works -
@bascule@matthew_d_green oh, I'm not doubting that. keeping crypto obscure is in the commercial interest of crypto vendors.
End of conversation
New conversation -
-
-
@bascule@matthew_d_green there's also "handshake" aka Diffie-Hellman, which results in a shared secret for symmetric encryptionThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.