![]() ![]() In a recent Learn Blog article about network security, we looked at the differences between RSA and ECC encryption. As a result, you now have a very high degree of confidence that Tom Shaw is who he says he is. You have, in fact, just run through a peer verification protocol with your Uncle George. It’s not every day you discover a long-lost cousin! What just happened? You look forward to meeting them, and in fact you think you’ll probably comp their stay at your B&B and see if they’ll let you show them around town. ![]() Sorry I forgot to tell you about them! Don’t worry, boy, I’ll text you a photo of your cousin.”Ī few minutes later, you’re looking at a photo of Tom and Sally. “So that’s what this is about? Yes siree Bob, I did mention your fine bed and breakfast to Tom last time he and Sally were over for dinner. The next thing you hear is your uncle’s booming laughter. I’m sorry it’s been so long! But a fellow named Tom Shaw contacted me, claiming he’s my third cousin? And that you told him we’d discount his stay at our bed and breakfast? I just want to be sure we’re not being scammed by some stranger.” “It’s really nice to talk to you as well, Uncle George. The combination of his Southern accent and over-the-top manners crossing the miles via your phone connection are a delight to your ears, and you have absolutely no doubt that it’s your dear Uncle George who picked up the phone. Sure enough, even though you can’t see him, you relish the sound of Uncle George’s resonant baritone. So, tell me, son, to what do I owe the elegant pleasure of your phone call this morning?” “Jack! It’s great to hear your voice, my boy! Your Aunt and I are just fine, absolutely spectacular, thank you. How are you and Aunt Bea doing these days?” ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |