
#361: Tether, Holepunch, and Keet with Paolo Ardoino
TFTC: A Bitcoin Podcast
00:00
The Basics of Authentication Using Keys
So there's some form of private, public key creptography involved here. Where does this comeot come in andd so it's basely, use your authentication using keys correctly. And the coolcool thinks that you can derive sub keys of the chat, a sub key, so likein a tree form. So you could have movepolidantiss for the charts, if you want to have multiplidantis,. For example, all parts of the same root key. You can go down, but you cannot drive up and er. But that is actually cool, because then we it allows us to do like multi device pering. We can allow you to y dont em sink the
Transcript
Play full episode