📄️ What is tiCrypt crowd security?
tiCrypt front end requests and verifies the user's public key from the server using their fingerprint(digital signature).
📄️ What is tiCrypt key pinning?
Is another term for crowd security designed to resist impersonation attacks and fraudulent digital certificates.
📄️ How does the chain of trust combined with crowd security works in practice?
Chain of trust is given by the countersigning action of Tera Insights key.
📄️ What is a Resource Key?
The resource key is the symmetric key, also called AES-256 key which is used to encrypt a tiCrypt resource.
📄️ What is a Public key?
Public keys are visible asymmetric keys to the server and other users used to encrypt resources in tiCrypt.
📄️ What is a Private key?
Private Keys are hidden SHA-256 asymmetric keys used to decrypt resources in tiCrypt and perform various actions.
📄️ What's the distinction between a key's fingerprint and the key itself?
The fingerprint is a uniquely computed fingerprint(SHA-256) key summary from the full key.
📄️ What is the general description of the secure hash function?
Secure hash function is a uniquely computed string of code of 256 bits which acts as a digital signature (fingerprint) in contrast with the public-key cryptography.