![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/2QNz7bkA1V.png)
2·
7 months agoBy that analogy they’re not even putting crap on your plate, they’re putting stickers on your food telling you to try other food. I don’t want stickers on my food even if they’re advertising something I might like 😭
By that analogy they’re not even putting crap on your plate, they’re putting stickers on your food telling you to try other food. I don’t want stickers on my food even if they’re advertising something I might like 😭
I usually (but not often enough tbh) refer to owasp documentation, like this one https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html They basically say elliptic curves for asymmetric encryption, or RSA with a key of at least 2048 bits
I’d wager most, if not all of them. Ideally you’d have a program you want to use because it’s promising, but instead you keep returning to whatever you used before that because certain use cases aren’t handled well (or at all).