<divclass="post-excerpt"><p>In a few previous articles I have explained <ahref="/2020/01/26/rsa1.html">why encryption may be important to you</a> and <ahref="/2020/02/19/rsa2.html">how the theory behind encryption works</a>. I did not yet explain the system of asymetric cryptography, however. That is what this article is for.</p>
</div>
@ -50,7 +50,7 @@ These are the everyday tools of many privacy advocates and computer nerds.</p>
<tr>
<td>
<h2class="post-title"><aclass="post-title-link"href="/2020/02/19/rsa2.html">How Does Encryption Work, in Theory?</a></h2>
<h3class="post-title"><aclass="post-title-link"href="/2020/02/19/rsa2.html">How Does Encryption Work, in Theory?</a></h2>
<spanclass="post-date">19 February 2020</span>
<divclass="post-excerpt"><p>There are many kinds of encryption used in our everyday communication. Online and offline, over the internet and in person. In this article, I will explain the basics of how encryption should work in theory. I explain in <ahref="/2020/01/26/rsa1.html">this article</a> why encryption is important, and why <em>you</em> should care about it.</p>
</div>
@ -59,7 +59,7 @@ These are the everyday tools of many privacy advocates and computer nerds.</p>
<divclass="post-excerpt"><p>What is the most embarassing thing you have typed into Google search? What is the most personal secret you told a friend in confidence? What is your bank password? What is your business’s secret to stay ahead of the competition?</p>
</div>
@ -68,7 +68,7 @@ These are the everyday tools of many privacy advocates and computer nerds.</p>
<tr>
<td>
<h2class="post-title"><aclass="post-title-link"href="/2020/01/22/padding-and-margin.html">Padding And Margin</a></h2>
<h3class="post-title"><aclass="post-title-link"href="/2020/01/22/padding-and-margin.html">Padding And Margin</a></h2>
<spanclass="post-date">22 January 2020</span>
<divclass="post-excerpt"><p>Many people have expressed confusion over how padding and margins work in HTML/CSS. I have been one of those people. In this short article I will explain what the differences are between the two, and how it may affect the functionality of your site.</p>
<?xml version="1.0" encoding="utf-8"?><feedxmlns="http://www.w3.org/2005/Atom"><generatoruri="https://jekyllrb.com/"version="4.0.0">Jekyll</generator><linkhref="http://localhost:4000/feed.xml"rel="self"type="application/atom+xml"/><linkhref="http://localhost:4000/"rel="alternate"type="text/html"/><updated>2020-04-10T04:41:56+00:00</updated><id>http://localhost:4000/feed.xml</id><entry><titletype="html">How To Encrypt Your Own Documents Using gpg</title><linkhref="http://localhost:4000/2020/04/06/rsa4.html"rel="alternate"type="text/html"title="How To Encrypt Your Own Documents Using gpg"/><published>2020-04-06T00:00:00+00:00</published><updated>2020-04-06T00:00:00+00:00</updated><id>http://localhost:4000/2020/04/06/rsa4</id><contenttype="html"xml:base="http://localhost:4000/2020/04/06/rsa4.html"><p>If you have ever wanted to garuntee the utmost security of your emails and documents, then this is the guide for you!
<?xml version="1.0" encoding="utf-8"?><feedxmlns="http://www.w3.org/2005/Atom"><generatoruri="https://jekyllrb.com/"version="4.0.0">Jekyll</generator><linkhref="http://localhost:4000/feed.xml"rel="self"type="application/atom+xml"/><linkhref="http://localhost:4000/"rel="alternate"type="text/html"/><updated>2020-04-10T05:24:02+00:00</updated><id>http://localhost:4000/feed.xml</id><entry><titletype="html">How To Encrypt Your Own Documents Using gpg</title><linkhref="http://localhost:4000/2020/04/06/rsa4.html"rel="alternate"type="text/html"title="How To Encrypt Your Own Documents Using gpg"/><published>2020-04-06T00:00:00+00:00</published><updated>2020-04-06T00:00:00+00:00</updated><id>http://localhost:4000/2020/04/06/rsa4</id><contenttype="html"xml:base="http://localhost:4000/2020/04/06/rsa4.html"><p>If you have ever wanted to garuntee the utmost security of your emails and documents, then this is the guide for you!
It should be noted that in some circles the tools used are more common than in others.
These are the everyday tools of many privacy advocates and computer nerds.</p>
<p>These commands are nice, but why is there not a <codeclass="highlighter-rouge">openvpn-client@random</code> so that I can randomize out of the possible files?</p>
<p>I am sure there would be a way to have a systemd service envoked like so:</p>
<p>This would enable a randomization service for that interface, relinking
the boot-time process by looking in the directory the VPN interface
@ -114,7 +120,7 @@ should be looking in, and chosing a random file.</p>
<p>Very useful for VPN clients. I have no idea if this has currency anywhere else.</p>
<h2id="3-language-ideas">3. Language Ideas</h2>
<h3id="3-language-ideas">3. Language Ideas</h3>
<h4id="31-add-zhuyin-support-for-epub-with-pinyin">3.1 Add Zhuyin Support for <ahref="https://github.com/TTWNO/epub-with-pinyin">epub-with-pinyin</a></h4>
@ -141,7 +147,7 @@ thus stopping their pronunciation to appear above them (Pinyin/Zhuyin).</p>
<p>Given my interest in similar things, possibly apply to work for them,
or encourage them to BSD some of their libraries.</p>
<h2id="4-other-crazy-ideas">4. Other Crazy Ideas</h2>
<h3id="4-other-crazy-ideas">4. Other Crazy Ideas</h3>
<h4id="41-podcast-not-sure-what-about">4.1 Podcast: Not Sure What About</h4>