🃏Joker to cybersecurity@infosec.pub · 2 days agoThe fascinating security model of dark web marketplacesboehs.orgexternal-linkmessage-square11fedilinkarrow-up135arrow-down10cross-posted to: [email protected]
arrow-up135arrow-down1external-linkThe fascinating security model of dark web marketplacesboehs.org🃏Joker to cybersecurity@infosec.pub · 2 days agomessage-square11fedilinkcross-posted to: [email protected]
minus-squarebaldingpudenda@lemmy.worldlinkfedilinkarrow-up5·2 days agoThey’re talking about PGP encryption. It’s creates a private key for you and a public key you share with every one. Whoever want to send you a message encrypts it with your public key. The only way to decrypt it is your private key. pgp vid
minus-squarestinky@redlemmy.comlinkfedilinkarrow-up3arrow-down5·2 days agoCorrect. But my question was which message, not which technology.
They’re talking about PGP encryption. It’s creates a private key for you and a public key you share with every one. Whoever want to send you a message encrypts it with your public key. The only way to decrypt it is your private key. pgp vid
Correct.
But my question was which message, not which technology.