asmoranomar@lemmy.worldtopolitics @lemmy.world•Kamala Harris drops new clue about her V.P. choice
3·
1 month agoEven if, still should do ice cream gig anyways.
Even if, still should do ice cream gig anyways.
100k voters attended. Not surprised it doesn’t look the same as 100k people.
I was always told the bugs use moonlight for navigation, and artificial light of any kind throws them off. But as a kid, I didn’t question it and there was no reason to verify or prove it. It was simple and made sense. I’m not saying my interpretation was common sense, but I also never heard someone say bugs fly to light for warmth. My 7 yr old ass would probably question how bugs existed before fire or something stupid.
In some instances of private/public key systems, this is done. It’s mainly for the purpose of ensuring the recipient knows who the sender was and also ensuring the sender knows who the recipient is.
Quick primer: If you encrypt with your private key, everyone knows it was sent by you. If someone encrypts with your public key, they know you will receive it. Use your private key and someone’s public key together and you know only that person got it.
In practice, lately another step is added to negotiate a third temporary/session key. This ensures keys aren’t used forever, and if compromised a new one can be generated. This is more secure than encrypting twice, because you never know what data is sensitive and picking the wrong one requires the attacker to start from scratch.