Orca Slicer or die!

So how does this effect you? Did you wake up one morning and suddenly your printer no longer worked? Or more likely did you see something on your favorite social media site that whipped you up into a frenzy?

Do you even understand how keys work in an encrypted system? What makes you think that there is a security key, the security key. That sounds so silly. Security keys, in a sophisticated system, can be regularly created and destroyed on a dynamic basis. They are used in a handshake as follows:

  • The originator, or in reality his software, creates a private key (kind of like an encoder ring) and from this private key his software creates a public key (also a kind of encoder ring) and sends it to the receiver.
  • The receiver, using the same software then encrypts his message using the public key and sends it to the originator.
  • The message can only be decrypted using the private key, which only the originator has.
  • In a highly secure system the private key is deleted at the end of each session and a new one with its associated public key created for the next communication.
  • For two way communication each party has their own private and public keys, which can be randomly generated in the software with each using the public key of the other to send messages.

The other thread Explaining the "Auth System" in laymans terms is pure hogwash. It is stupidity on steroids.

4 Likes