Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"Below is an example of such a tree"... and there is a picture of a binary tree, with no indication as to how the tree is used.

I appreciate trying to explain the interesting technology behind authenticating modules, but this diagram appears to explain nothing at all.



There was a talk at gophercon that I belive goes into more detail about how this works and the cryptography behind it (I only skimmed it so far) https://youtu.be/KqTySYYhPUE




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: