• Kazumara@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    4 days ago

    That was a rhetorical question after I pointed out the inconsistency: The author claimed they keys were for verification and then also said they were used to decrypt.

    That’s most likely bullshit, and if it isn’t they should explain the unusual setup in detail instead of glossing over it.