I’m satisfied with the answers and insights I got so far. But if you may add I’d be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don’t know anything. I know quite well about Prime number and theorems about them on math, but not their applications
Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can’t read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can’t figure out how to unlock it and decrypt the data)?
this is very detailed answer thank you. however I face an ambiguity regarding this:
This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).
How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??
surprisingly, I’m sure getintopc’s mods are same as the notorious oceanofgames yet it is considerably a more reputable site. Although I have to say it is mentioned on the megathread with the unsafe sites as one of the ones Particularly avoided by the pirate community.
If you already downloaded the file then scan with Kaspersky or Malwarebytes as they are imo the most reputable AVs in the industry nowadays (the free tier of Kaspersky is more than enough). Alternatively I think you can copy the download URL and patse it on virustotal and get the file scanned (no need to actually upload I think).