@dohpaz42@lemmy.world avatar

dohpaz42

@[email protected]

Web Developer by day, and aspiring Swift developer at night.

This profile is from a federated server and may be incomplete. View on remote instance

dohpaz42 , (edited )
@dohpaz42@lemmy.world avatar

Basically you’re saying that Mother Nature pioneered the Gen-X style of parenting?

Edit: I meant to say the parents of Gen-X’ers (Boomers), and not to infer it was the Gen-X’ers themselves. My apologies.

dohpaz42 ,
@dohpaz42@lemmy.world avatar

Oh. You know what, I get how you would think that. I meant the parents of Gen-X’ers. I’ll update. My apologies.

dohpaz42 ,
@dohpaz42@lemmy.world avatar

Those ears look like German Shepard. The rest of him hints at Pit Bull.

If that’s even remotely close to accurate, you’ve got a super intelligent good boy on your hands. And while intelligence can be good, it can also lead to a lot of trouble. 😅 make sure to keep him stimulated and tired. 🤣

dohpaz42 ,
@dohpaz42@lemmy.world avatar

They screw up your 401k, probably to the tune of millions, and you get McD’s out of it. God bless America. 🫡

dohpaz42 ,
@dohpaz42@lemmy.world avatar

I want to know, and this is somewhat rhetorical, how in the Hell do companies get to break laws, and at best only ever get fined? Better yet, how can they not be held accountable when they “promise” to make changes?

No no, I get it. Companies pay lobbyists and all. They buy their way out of trouble and pay lip service to a very complacent society. When will we wake up and do something about it?

Siberian Husky temper tantrum ( www.youtube.com )

Video description: This is why they say huskies are stubborn. They’re very smart but they have low motivation to please their owners. Zeus loves playing in the water in the bathtub and wanted the water turned on. However it was time for his walk and he was just being stubborn because he wanted to play in the water.

dohpaz42 ,
@dohpaz42@lemmy.world avatar

I got a husky/gsd mix and yes, he is just as stubborn as this husky when he doesn’t get his way.

How does a signing a post with a pgp key prove that you are actually the person behind the post?

I saw that people on the dark web would sign their posts with a PGP key to prove that their account has not been compromised. I think I understand the concept of how private and public keys work but I must be missing something because I don’t see how it proves anything....

dohpaz42 ,
@dohpaz42@lemmy.world avatar

The short answer is no. A bit longer of an answer is that with the public key, anybody can encrypt data. Only the owner(s) of the private key can decrypt the data. That is a key point: encrypted data by itself is meaningless. If you were to attempt to decrypt random data (or change one single character of valid encrypted data), you’d get literal garbage output. But, valid encrypted data and the corresponding private key can always unencrypt back into the original format.

This is why emphasis is always made to never share or expose your private key. Couple the private key with the always-available public key and you’ve got a man-in-the-middle (MitM) attack. This is where an attacker could decrypt the data with the private key, change it, re-encrypt it with the public key, and send it along to the destination without anybody knowing it was altered.

I hope this helps.

dohpaz42 ,
@dohpaz42@lemmy.world avatar

You’ve got it backward. You encrypt with the public key, and decrypt with the private key. Otherwise, you’re spot on.

dohpaz42 ,
@dohpaz42@lemmy.world avatar

In a digital signature system, a sender can use a private key together with a message to create a signature. Anyone with the corresponding public key can verify whether the signature matches the message, but a forger who does not know the private key cannot find any message/signature pair that will pass verification with the public key

en.m.wikipedia.org/wiki/Public-key_cryptography

dohpaz42 ,
@dohpaz42@lemmy.world avatar

You’re not though. You said encryption occurs with the public key and decryption occurs with the private. That’s the opposite of what happens and what the quoted text says.

From the same source:

In a public-key encryption system, anyone with a public key can encrypt a message, yielding a ciphertext, but only those who know the corresponding private key can decrypt

dohpaz42 ,
@dohpaz42@lemmy.world avatar

Funny story: you didn’t change the wrong info. The sad part is that you’re spreading misinformation and unwilling to hear otherwise. This is more dangerous than helpful.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines