[tahoe-dev] "Elk Point" design for mutable, add-only, and immutable files

Shawn Willden shawn at willden.org
Thu Sep 17 00:59:04 UTC 2009


On Wednesday 16 September 2009 04:04:56 pm David-Sarah Hopwood wrote:
> They use signature algorithms, which are asymmetric cryptography, but
> not asymmetric encryption.

Ah, that makes sense then.  Thanks.

	Shawn.



More information about the tahoe-dev mailing list