396
cyber rule (lemmy.blahaj.zone)
submitted 1 week ago by not_IO to c/196
you are viewing a single comment's thread
view the rest of the comments
[-] hildegarde 4 points 1 week ago

Both keys can be used to encrypt files that only the other key can read. When sending encrypted messages you generally encrypt with both the sender's private key, and the recipients public key, so that the recipient can decrypt the document, but they can also know it was sent from who they expect.

You verify the public key by decrypting something encrypted by the private key.

[-] zea_64 2 points 1 week ago

So the government MitMing you can know it's from you? I don't think that changes anything. There's still nothing stopping a MitM from just changing the key shown at the bottom of the page and then reading whatever you send.

this post was submitted on 29 Jul 2025
396 points (100.0% liked)

196

18162 readers
230 users here now

Be sure to follow the rule before you head out.


Rule: You must post before you leave.



Other rules

Behavior rules:

Posting rules:

NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.

If you have any questions, feel free to contact us on our matrix channel or email.

Other 196's:

founded 2 years ago
MODERATORS