Many moons ago I did a project at uni where we implemented elliptic curve cryptography in Java and released it as open source. Unsurprisingly, we had no idea what we were doing. Some years later I get a random mail from someone using it on some embedded system…
I don’t want to know, and I fear that ist is paramount that I maintain plausible deniability 😂♥️🙏
Many moons ago I did a project at uni where we implemented elliptic curve cryptography in Java and released it as open source. Unsurprisingly, we had no idea what we were doing. Some years later I get a random mail from someone using it on some embedded system…
I don’t want to know, and I fear that ist is paramount that I maintain plausible deniability 😂♥️🙏