Posting The Key To Your Front-Door … To Stop A Robbery
Published in
4 min readAug 4, 2018
Before I start, here’s a bit of crypto. With public key encryption, we create a key pair — a public key and a private key. The two work together, so that I can encrypt with one and then decrypt with other. The main usages of this is are signing a transaction and in key exchange. In transaction signing, I encrypt something related to a message (such as the hash of the message) with my private…