On Wednesday 16 September 2009 04:04:56 pm David-Sarah Hopwood wrote: > They use signature algorithms, which are asymmetric cryptography, but > not asymmetric encryption.
Ah, that makes sense then. Thanks.
Shawn.
_______________________________________________
tahoe-dev mailing list
[email protected]
http://allmydata.org/cgi-bin/mailman/listinfo/tahoe-dev
