Degengineering | $DGNGX pfp
Degengineering | $DGNGX

@degengineering.eth

Keeping things private on the Internet is difficult but it does not have to be hardπŸ’‘ Sign/Verify, Encrypt/Decrypt These are the four operations users need to perform themselves on their own devices in order to ensure confidentiality and be able to prove or verify the origin and integrity of their electronic documents. Doing these operations instead of end users is keeping them away from true sovereignty over the security of their communications. Not your keys, not your coins Not your keys, not your identity Not your keys, not your secrets You do not need to understand the mathematics behind it. You do not need to be an IT professional. You need to learn the right abstractions, have access to trustworthy tools and β€” most importantly β€” keep asking and verifying proofs. If a system or a tool is really secure, it should be able to provide you with proofs which can be easily and independently verified by anyone at any time without needing to trust the tool itself πŸ‘‡
0 reply
0 recast
1 reaction