-
-
Replying to @cmuratori
@LiaSae@nothings Ie., we currently know of no algorithms (including quantum) which can break proper private-key encryption, period.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@cmuratori@nothings Everything being in "currently" :)1 reply 0 retweets 0 likes -
Replying to @cmuratori
@cmuratori@nothings Private key encryption is still vulnerable to man-in-the-middle IIRC ?1 reply 0 retweets 0 likes -
Replying to @LiaSae1 reply 0 retweets 0 likes
-
Replying to @cmuratori
@LiaSae@nothings Man-in-the-middle attacks can only be used against endpoints which _don't_ each know the private key.1 reply 0 retweets 0 likes -
Replying to @cmuratori
@cmuratori@nothings But you need to share some info at some point no matter what, right ? Or are my vague crypto rudiements that rusty ?1 reply 0 retweets 0 likes -
Replying to @LiaSae
@LiaSae@cmuratori Right, but normally you do that in person. It's having no-private-meeting that brings in *public keys* where MITM matters2 replies 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.