diff options
author | friendica <info@friendica.com> | 2013-11-21 20:08:04 -0800 |
---|---|---|
committer | friendica <info@friendica.com> | 2013-11-21 20:08:04 -0800 |
commit | e4c64c7167c9566a01c9382f774f4e9a184ea4e0 (patch) | |
tree | 373f5227e8a907c5bd35715836da0c39d6dc8c5b /vendor | |
parent | f2435ed4cdee6e20a92f2acfd60399cb92b2c1e3 (diff) | |
download | volse-hubzilla-e4c64c7167c9566a01c9382f774f4e9a184ea4e0.tar.gz volse-hubzilla-e4c64c7167c9566a01c9382f774f4e9a184ea4e0.tar.bz2 volse-hubzilla-e4c64c7167c9566a01c9382f774f4e9a184ea4e0.zip |
e2ee algorithms are now pluggable so if you want to roll your own algorithm or do something like swap_bytes(rabbit(left_shift(3,triple_aes256(right_shift(base64(text)))))) - go for it. As long as the person at the other end can reverse it, you can do pretty much whatever you want. I'd like to see the NSA crack that one - especially if the algorithm was called something like "dishwasher" or something which didn't provide a lot of clues.
Diffstat (limited to 'vendor')
0 files changed, 0 insertions, 0 deletions