![@charonn0@startrek.website avatar](https://kbin.spritesserver.nl/media/cache/resolve/avatar_thumb/00/8b/008b040ceebed331c803fc6bbb84d8d534562b2ba3a9c326396a2bbccf010514.png)
![@charonn0@startrek.website](https://kbin.spritesserver.nl/media/cache/resolve/user_cover/b4/78/b47809437e83baa000dce7612e3fc57c6968013dbe097b37abf15129147bd41c.png)
![@charonn0@startrek.website avatar](https://kbin.spritesserver.nl/media/cache/resolve/avatar_thumb/00/8b/008b040ceebed331c803fc6bbb84d8d534562b2ba3a9c326396a2bbccf010514.png)
Seer of the tapes! Knower of the episodes!
This profile is from a federated server and may be incomplete. Browse more on the original instance.
Seer of the tapes! Knower of the episodes!
This profile is from a federated server and may be incomplete. Browse more on the original instance.
the encryption keys, why can't the government just sneak on them?
disclaimer: I’m just asking to get understanding of the theory behind network traffic encryption, I know this doesn’t happen irl most likely....