accountless.eth pfp
accountless.eth
@accountless.eth
"To get the best of both worlds, you often use asymmetric cryptography to communicate a symmetric cryptographic key that you then use for bulk data transfer." https://developer.apple.com/documentation/security/generating-new-cryptographic-keys
0 reply
0 recast
0 reaction

Erica-Sofia Fernandes pfp
Erica-Sofia Fernandes
@ivanvicente
Effective encryption strategy
0 reply
0 recast
0 reaction