(no title)
19870213 | 3 years ago
I suppose you could make it part of a signature scheme for files (file written by passcode X) so that your defense could point to the discrepancy in your favour.
19870213 | 3 years ago
I suppose you could make it part of a signature scheme for files (file written by passcode X) so that your defense could point to the discrepancy in your favour.
m00x|3 years ago
oh_my_goodness|3 years ago
feet|3 years ago
bheadmaster|3 years ago
Private key for encryption, public key for decryption. You give the authorities the public key, they can't plant any data with it.
HPsquared|3 years ago
megous|3 years ago
ranguna|3 years ago