To: Viennacon
what is the verification part at the bottom about
Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.
63 posted on
11/04/2016 5:58:02 PM PDT by
JamesP81
To: JamesP81
Without going into too much of the details of symmetric and asymmetric encryption, those appear to be hashes, assuming they're legit. Such a hash would be used to either decrypt encrypted data or verify the source of a set of data.Just in case it was an info_hash I hand entered one into qbittorrent and got a not bittorrent answer. (I wish people would post links.)
115 posted on
11/04/2016 6:23:48 PM PDT by
Stentor
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson