hmm yeah most likely. I forgot to add a question mark at the end of my reply, maybe it’s not the case, maybe
so, he just over-exaggerated things here, actually when you click there is a page that asks you for your creditentials and kids get tricked to enter them
aah, so in this trick I have to enter my creditentials again,
I don’t understand, as you said the hacker’s server requests my credits, so am I not supposed to be prompted to accept something by the browser or Discord app? Twitter and Google usually prompt you and require you to click “allow”
I think I see the point now
I was asking only about the technology stuff actually so huge thanks, mom likes Nestlé’s milk for some reason, me not, their products are always of higher price even water.
I keep hearing good things about the pixel, but the problem is that Google doesn’t make that much phones, while Samsung has devices for every price (As, Js, Ss, …etc) and even if you’re screwed it’s not like Wiko (traume intensifies). I don’t hate TikTok specifically but yeah I hate bloatware on my devices, I used to have even Youtube and Chrome uninstalled back when I had a smart phone (J4+ was my brother’s choice for me)
marked to the note!
I’d like to know the alternatives, especially for Samsung, I still think it is the best smart phone company
Google , except android
May GrapheneOS change that
I’m satisfied with the answers and insights I got so far. But if you may add I’d be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don’t know anything. I know quite well about Prime number and theorems about them on math, but not their applications
Thank you! extremely helpful answer
so you can encrypt a message with my public key but you cannot decrypt it afterward ??
Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can’t read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can’t figure out how to unlock it and decrypt the data)?
The situation is just an example, I’m not actually planning a revolution. just for demonstration purpose
this is very detailed answer thank you. however I face an ambiguity regarding this:
This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).
How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??
Telegram is not E2E encrypted per default, I think it offers the feature if you start secret chat ?
the general census on this thread is that he war over-exaggerating, he meant that it tricks you into inserting you Credential