Well, you do. It is stored on your local machine only.
--Keifer
On Wed, Dec 2, 2020 at 1:10 PM Wisdom With Rahul
wrote:
> This idea is interesting but who owns all the keys?
>
> Thanks and regards!
>
>
>
>
> On Fri 13 Nov, 2020, 6:49 AM Keifer Bly, wrote:
>
>> Well, the mechanism is that it ov
Hey, I left some comments on the video, I am not a Tor developer but I
think I made some valid points, please respond to them
Thanks and Regards
On Wed, Dec 2, 2020 at 4:10 PM Wisdom With Rahul
wrote:
> This idea is interesting but who owns all the keys?
>
> Thanks and regards!
>
>
>
>
> On Fri
This idea is interesting but who owns all the keys?
Thanks and regards!
On Fri 13 Nov, 2020, 6:49 AM Keifer Bly, wrote:
> Well, the mechanism is that it overwrites the key ever time, so each
> message has its own unique key, also the receiver needs to verify the key
> file with the built in
Well, the mechanism is that it overwrites the key ever time, so each
message has its own unique key, also the receiver needs to verify the key
file with the built in tool to be able to use it. So an attacker does not
know this the only way to get this information is from the person that
created the
On Thu, Nov 12, 2020 at 11:19:44AM -0800, Keifer Bly wrote:
> Hi there,
Hello,
> So I have a new email encryption system which requires that the user has
> the specific key file generated for a message rather than the password,
> specifically this software generates a unique key file for a specif
Hi there,
So I have a new email encryption system which requires that the user has
the specific key file generated for a message rather than the password,
specifically this software generates a unique key file for a specific
message every time a message is created. The user then enters the date an