🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 24 days agoThe fascinating security model of dark web marketplacesboehs.orgexternal-linkmessage-square11fedilinkarrow-up134arrow-down10cross-posted to: [email protected]
arrow-up134arrow-down1external-linkThe fascinating security model of dark web marketplacesboehs.org🃏Joker@sh.itjust.works to cybersecurity@infosec.pub · 24 days agomessage-square11fedilinkcross-posted to: [email protected]
minus-squarebaldingpudenda@lemmy.worldlinkfedilinkarrow-up5·24 days agoThey’re talking about PGP encryption. It’s creates a private key for you and a public key you share with every one. Whoever want to send you a message encrypts it with your public key. The only way to decrypt it is your private key. pgp vid
minus-squarestinky@redlemmy.comlinkfedilinkarrow-up3arrow-down5·23 days agoCorrect. But my question was which message, not which technology.
They’re talking about PGP encryption. It’s creates a private key for you and a public key you share with every one. Whoever want to send you a message encrypts it with your public key. The only way to decrypt it is your private key. pgp vid
Correct.
But my question was which message, not which technology.