![]() ![]() But this solution is already weak ( as the software itself has to include the secret key somewhere), so I don't think this discovery invalidates the solution as far as it goes. I have recently read that this approach is not cryptographically very sound.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |