Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
HideousKojima
on March 24, 2022
|
parent
|
context
|
favorite
| on:
If you’re not using SSH certificates you’re doing ...
For public key cryptography my go to analogy for non-technical people has always been the mailing padlocks example (where the padlock is the public key, and the key to unlock itbis the private key that stays with the sender).
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: