AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Encrypting a Message in the Client-to-Server Protocol
The idea that I'm going to encrypt a message to a counterparty in the end-to-end protocol that happens to be the same key shouldn't be possible. And what we did, we used our magical computing power that we have in the backyard to find the public key that has a specific shape. It starts with a one, it ends with a one and in the middle there's something that can be copy-basted. So now you have a magic 32 byte string that can be interpreted as an ephemeral public key of which we know the private key because we computed it that way. Now... I love it. I hate it.