• jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Thanks for pointing that out! It took 15 minutes but I did finally download the video and watch it.

      Is good explanation. I got irrationally annoyed when you use Cindy as the example of the receiver of the cryptographic exchange. Applied cryptography always uses Bob and Alice. So there was just mental conflict when you said Cindy instead of Alice.

      Good video!