John Bulmer Photography and Nor'easter Films
Public Encryption Keys
Excrypted Messaging: Signal Private Messenger (preferred), OTR or Cryptocat available upon request.
Unseen.is Username: johnbulmer
Communicate with me using end-to-end encryption via my verified identity at keybase.io/johnbulmer/
What is Asymmetric Cryptography?
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other – as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both. (Wikipedia)
© 1999-2017 John Bulmer Photography | Saratoga, New York | 1.866.317.6777