accountless.eth
@accountless.eth
"To get the best of both worlds, you often use asymmetric cryptography to communicate a symmetric cryptographic key that you then use for bulk data transfer." https://developer.apple.com/documentation/security/generating-new-cryptographic-keys
0 reply
0 recast
0 reaction