Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Meaningless ... (Score 1) 248

The definition says nothing about who has access to keys, other than to say that the destination requires keys and knowledge of algorithms used.
It's still end-to-end encryption if a third party is responsible for generating keys and handing them out.
Think S/MIME and e-mail, a certificate authority generates keys for users to encrypt mail to each other. The mail is encrypted from end to end, but the keys are controlled by another party.

Slashdot Top Deals

I THINK THEY SHOULD CONTINUE the policy of not giving a Nobel Prize for paneling. -- Jack Handley, The New Mexican, 1988.

Working...