• 520@kbin.social
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    1 year ago

    There are logistical problems with that. Such as how you plan to get the key out to recipients.

    • sarmale@lemmy.zip
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      When someone wants to start a conversation they send their public key unencrypted (no need for it to be encrypted) and then you send your public key It will be one more message but the keyboard could have some sort of “profiles” for every persons public key, that you could select (This is just an idea, I have no coding experience)

      • 520@kbin.social
        link
        fedilink
        arrow-up
        2
        arrow-down
        5
        ·
        1 year ago

        Okay, but how do you then make sure that key isn’t intercepted? Anyone who has the key can read your messages

        • notfromhere@lemmy.one
          link
          fedilink
          arrow-up
          10
          arrow-down
          1
          ·
          edit-2
          1 year ago

          They are talking about asymmetric encryption which has a keypair, private key (kept secret only by the owner) and a public key that is used by everyone that would send them a message. You can’t decrypt the message with the public key when it is encrypted using the public key, you must use the private key to decrypt it.