this post was submitted on 21 Jan 2024
70 points (91.7% liked)
Privacy
32169 readers
479 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Asymetrical encryption solves this, here is my attempt to do an ELI5:
Adam want's to send a chat message to Ben, but want to do it securely, so they use a special program on their computers.
When the Adam's program first reaches out to Ben's computer, it asks for an unlocked padlock, this is a padlock that can only be unlocked by Ben's program.
Adam's program takes the padlock and crafts a new special series of padlocks that only Adam's program can unlock, which it put's in a box and locks it with Ben's padlock.
The box is sent to Ben's program, the program unlocks the box and creates it's own special series of padlocks that only Ben's program can unlock, put them in a box and locks it with Adam's padlocks.
The box is then sent to Adam's program, and is unlocked.
This now means that Adam's program can put messages to Ben in a box, lock the box with one of Ben's special padlocks and send it on it's way knowing that only Ben can unlock the box and read the message.
Likewise, Ben can also send messages in boxes locked with Adam's padlocks and know that only Adam can unlock them and read the message.
Added to this is the fact that messages from Ben can be verified as having used the special padlocks Adam sent to Ben, as else Adam's special key wouldn't fit the padlocks given to Ben.
In reality the padlocks are keys to lock a message, and the above text describe a secure key exchange.
Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can't read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can't figure out how to unlock it and decrypt the data)?
Yep, if a thrid party gets the padlock they can lock the box, but can't unlock other boxes
Thank you! extremely helpful answer