[tahoe-dev] "Elk Point" design for mutable, add-only, and immutable files

Shawn Willden shawn at willden.org
Wed Sep 16 17:59:04 PDT 2009


On Wednesday 16 September 2009 04:04:56 pm David-Sarah Hopwood wrote:
> They use signature algorithms, which are asymmetric cryptography, but
> not asymmetric encryption.

Ah, that makes sense then.  Thanks.

	Shawn.


More information about the tahoe-dev mailing list