Skip to main contentdfsdf

Jeremy Gollehon
  • [–]Asmor 15 points16 points  (4 children)

    <form onsubmit="return post_form(this, 'editusertext')" class="usertext warn-on-unload" id="form-t1_cubggxo6e4" action="#">

    Imagine a deadbolt. That deadbolt has a key, and you use the key to lock it and to unlock it. That's sort of what traditional encryption is like; you have a single key that's used to both encrypt and decrypt.


    Now imagine if there was a special deadbolt that had two keys; one key could only lock the deadbolt, but not unlock it. The other key could only unlock it, but not lock it.


    That's how public/private keypairs work. You can encrypt something with the public key, but that can only be decrypted by the private key. And vice versa.


    So the way this works is I can publish my public key, and you could take my public key and encrypt a message. You're now sure that only I, the sole possessor of the private key, am able to read that message.


    On the flip side, I could use my private key to encrypt a message, and then anyone could decrypt it with my public key. That way if you get a message claiming to be from me, and you're able to decrypt it with my public key, then you know that the message came from me.


    At the risk of stretching the deadbolt metaphor a little far, you could imagine that you had a special deadbolt that had three positions; left, right, and center. It's unlocked in the center, and it's locked if you turn it right or left. Now you've got two keys; one can only turn the deadbolt clockwise, the other can only turn it counterclockwise. Thus, either key is capable of locking the deadbolt, but only the opposite key can then unlock it.

Jeremy Gollehon
  • You and Provider share the same secret. If an attacker hacks into a company and gains access to both the password and the secrets database, he/she will be able to access every account completely unnoticed.
  • Because with U2F there is no secret shared and no confidential databases stored by the provider, a hacker cannot simply steal the entire databases to get access.

2 more annotations...

Jeremy Gollehon
    • Difference between rest parameters and the arguments object


      There are three main differences between rest parameters and the arguments object:

      • rest parameters are only the ones that haven't been given a separate name, while the arguments object contains all arguments passed to the function;
      • the arguments object is not a real array, while rest parameters are Array instances, meaning methods like sort, map, forEach or pop can be applied on it directly;
      • the arguments object has additional functionality specific to itself (like the callee property).
Jeremy Gollehon
  • When it previously rendered, the Calculator has specified that onTemperatureChange of the Celsius TemperatureInput is the Calculator’s handleCelsiusChange method, and onTemperatureChange of the Fahrenheit TemperatureInput is the Calculator’s handleFahrenheitChange method. So either of these two Calculator methods gets called depending on which input we edited.
Jeremy Gollehon
  • Bitcoin is the default currency on the dark web — but the speculators driving the current bubble are making it difficult to use Bitcoin for actual transactions. “Fuck you Bitcoin,” one buyer commented on the dark-web subreddit. “Went to do a direct deal today with a vendor, realized my $250 purchase would end up costing me $315 or so with fees and would still take probably 24 hours to get to him.” “I personally think there needs to be a grand movement on markets and vendors... to move to an alternative crypto, one that is not so god damn volatile and that can actually be viable,” wrote another.
Show more items

Highlighter, Sticky notes, Tagging, Groups and Network: integrated suite dramatically boosting research productivity. Learn more »

Join Diigo