• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    Thanks for pointing that out! It took 15 minutes but I did finally download the video and watch it.

    Is good explanation. I got irrationally annoyed when you use Cindy as the example of the receiver of the cryptographic exchange. Applied cryptography always uses Bob and Alice. So there was just mental conflict when you said Cindy instead of Alice.

    Good video!