Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Viennacon
what is the ‘verification’ part at the bottom about

Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.
63 posted on 11/04/2016 5:58:02 PM PDT by JamesP81
[ Post Reply | Private Reply | To 14 | View Replies ]


To: JamesP81
Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.

Just in case it was an info_hash I hand entered one into qbittorrent and got a not bittorrent answer. (I wish people would post links.)

115 posted on 11/04/2016 6:23:48 PM PDT by Stentor
[ Post Reply | Private Reply | To 63 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson