TFTC: A Bitcoin Podcast cover image

#361: Tether, Holepunch, and Keet with Paolo Ardoino

TFTC: A Bitcoin Podcast

00:00

The Basics of Authentication Using Keys

So there's some form of private, public key creptography involved here. Where does this comeot come in andd so it's basely, use your authentication using keys correctly. And the coolcool thinks that you can derive sub keys of the chat, a sub key, so likein a tree form. So you could have movepolidantiss for the charts, if you want to have multiplidantis,. For example, all parts of the same root key. You can go down, but you cannot drive up and er. But that is actually cool, because then we it allows us to do like multi device pering. We can allow you to y dont em sink the

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app