72c9d439eaa864ff4f68583cfa6e80f0ee5e60b66596cad18d6e9eb0dbfd6f0aa9e33cc92629e55b5fd5dfa7eeeabbbde95ee383df3175a69ee701d9a45c0117
And what am I supposed to do with these 64 bytes?
Verify his authorship of a posthumously published rant after he goes Kaczinski?
The list of enemies? X-D 512 bits is too short for a reasonable public key and too long for a symmetric key. Just right for a standard hash, though. Hashes don’t verify authorship, of course...
72c9d439eaa864ff4f68583cfa6e80f0ee5e60b66596cad18d6e9eb0dbfd6f0aa9e33cc92629e55b5fd5dfa7eeeabbbde95ee383df3175a69ee701d9a45c0117
And what am I supposed to do with these 64 bytes?
Verify his authorship of a posthumously published rant after he goes Kaczinski?
The list of enemies? X-D 512 bits is too short for a reasonable public key and too long for a symmetric key. Just right for a standard hash, though. Hashes don’t verify authorship, of course...