Code. . Hoo RH I TU mm tter? tum Rt FIND ‘M. One day. use and Beth started Alter thell first date. Bah sent dating, Alice a message encrypted with E purble Hear
Home Original Content Funny Pictures Funny GIFs YouTube Funny Text Funny Movies Channels Search
Buy your amazon goods through FJ's link.
Just click this link and search for any product you want. FJ gets a 6% commission on everything you buy.

Code

Hoo RH I TU
mm tter?
tum
Rt FIND ‘M.
One day. use and Beth started Alter thell first date. Bah sent
dating, Alice a message encrypted with
E purble Hear.
Bob and Alitle dated far years. what But: never told her what the
encrypted message said.
sear' r.
until. one night. Mee made a Bob was sure that by the time
h, she crashed the messages"
and every night, Ailee trlld he
deg met the message.
mam Yoo MOWRY HE?
will have really meant it
...
+225
Views: 15718
Favorited: 17
Submitted: 09/23/2013
Share On Facebook
Add to favorites Subscribe to orionar E-mail to friend submit to reddit
Share image on facebook Share on StumbleUpon Share on Tumblr Share on Pinterest Share on Google Plus E-mail to friend

Show All Replies Show Shortcuts
Show:   Top Rated Controversial Best Lowest Rated Newest Per page:
Order:
What do you think? Give us your opinion. Anonymous comments allowed.
#7 - bubetto ONLINE (09/24/2013) [+] (3 replies)
User avatar #11 - pureevil ONLINE (09/24/2013) [+] (4 replies)
But if his key was public, why did she need his private one?
#15 to #11 - anonymous (09/24/2013) [-]

Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.

For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.

As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice's Private Key.
User avatar #17 - bothemastaofall (09/24/2013) [-]
I'd give her my private key
0
#3 - fisterfight has deleted their comment [-]
#1 - anonymous (09/24/2013) [+] (6 replies)
Unfortunately requires 1.) a girlfriend and 2.) a girlfriend with some advanced knowledge about computers and not this average farmville chicks. Two things in life I probably never get.
 Friends (0)