On Wednesday 16 September 2009 04:04:56 pm David-Sarah Hopwood wrote:
> They use signature algorithms, which are asymmetric cryptography, but
> not asymmetric encryption.

Ah, that makes sense then.  Thanks.

        Shawn.
_______________________________________________
tahoe-dev mailing list
[email protected]
http://allmydata.org/cgi-bin/mailman/listinfo/tahoe-dev

Reply via email to