”In recent weeks, I’ve written about protecting data stored locally on a hard drive, against both people with physical access and potential remote attacks,” Glenn Fleishman writes for Macworld. 173 more words
Tags » Public-key Cryptography
There are tons of devices around with practically no user faced interface at all, which need to communicate securely with other devices. This includes devices such as a wireless thermometer communicating with a HVAC unit or a wireless lock on your door communicating with your phone when you tell it what keys to accept. 1,213 more words
In this post Alice and Bob will communicate through #chemlambda computations.
Alice and Bob have each a mol file: Alice has A.mol and Bob has B.mol. 535 more words