« Alice wants to encrypt a file for Bob. Bob enters his mail address and passphrase into MikroLock to obtain his Lock-ID. He sends this ID to Alice.
Alice encrypts the file and adds Bob's Lock-ID as recipient ID. Alice now sends the encrypted file to Bob, who is able to decrypt it using his passphrase/mail combination.
It is important to keep the passphrase secret - only the Lock-IDs (=public keys) are being exchanged. »
« Il vaut mieux mobiliser son intelligence sur des conneries que mobiliser sa connerie sur des choses intelligentes. »
# How does it work?
Posté par deuzene (site web personnel) . Évalué à 2.
« Alice wants to encrypt a file for Bob. Bob enters his mail address and passphrase into MikroLock to obtain his Lock-ID. He sends this ID to Alice.
Alice encrypts the file and adds Bob's Lock-ID as recipient ID. Alice now sends the encrypted file to Bob, who is able to decrypt it using his passphrase/mail combination.
It is important to keep the passphrase secret - only the Lock-IDs (=public keys) are being exchanged. »
« Il vaut mieux mobiliser son intelligence sur des conneries que mobiliser sa connerie sur des choses intelligentes. »
Suivre le flux des commentaires
Note : les commentaires appartiennent à celles et ceux qui les ont postés. Nous n’en sommes pas responsables.