zaknenou

joined 2 years ago
[–] zaknenou 3 points 2 years ago (1 children)

you should have used VPN to download mate, or maybe even a proxy like v2ray. the thing is they notice your ip address when you are torrenting (cuz when you engage in Torrent you reveal your IP address publicly, to everyone downloading the thing) and send a lawsuit to your ISP with your IP address written, you ISP gladly reveals the IP is yours and sends the lawsuit to you so that you can prepare for the case. So if nothing comes from this I would say they didn't notice you.

[–] zaknenou 1 points 2 years ago

Yu-Gi-Oh used to be popular with Hamashi

[–] zaknenou 1 points 2 years ago* (last edited 2 years ago) (1 children)

I'm satisfied with the answers and insights I got so far. But if you may add I'd be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don't know anything. I know quite well about Prime number and theorems about them on math, but not their applications

[–] zaknenou 3 points 2 years ago

Thank you! extremely helpful answer

[–] zaknenou 3 points 2 years ago (2 children)

so you can encrypt a message with my public key but you cannot decrypt it afterward ??

[–] zaknenou 1 points 2 years ago

funny that now awards are removed from reddit, was a great aspect imo

[–] zaknenou 2 points 2 years ago* (last edited 2 years ago) (2 children)

Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can't read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can't figure out how to unlock it and decrypt the data)?

[–] zaknenou 1 points 2 years ago

The situation is just an example, I'm not actually planning a revolution. just for demonstration purpose

[–] zaknenou 9 points 2 years ago* (last edited 2 years ago) (10 children)

this is very detailed answer thank you. however I face an ambiguity regarding this:

This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).

How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??

[–] zaknenou 2 points 2 years ago

thank you! I didn't know this. so we defederated from them non-mutually

[–] zaknenou 2 points 2 years ago (2 children)

does this project (there is a demonstration video in the link) address the thing ?

[–] zaknenou 2 points 2 years ago* (last edited 2 years ago)

I still can't understand. In your example most likely I selected the eye then clicked suppr, I can go back and copy it after selection? Or you're talking about an ability to re-arrange actions ?

view more: ‹ prev next ›