vortex to Cryptography · 4 months ago39C3: To sign or not to sign: Practical vulnerabilities in GPG & friendsmedia.ccc.deexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10file-textcross-posted to: technology@lemmy.world
arrow-up12arrow-down1external-link39C3: To sign or not to sign: Practical vulnerabilities in GPG & friendsmedia.ccc.devortex to Cryptography · 4 months agomessage-square0linkfedilinkfile-textcross-posted to: technology@lemmy.world