Posts

Showing posts from April, 2025

A random post about Pronghorns

 I just learned about pronghorns, basically "American Antelopes". They aren't actually antelopes apparently and are more related to giraffes and okapi (forest giraffe).  In some sources, they are considered the second-fastest land animal, behind cheetahs. The adaptation of a pronghorn might've also been influenced by an extinct species known as the American cheetah. That's odd actually, I never knew they existed.  Even if they're the "second-fastest" land animal, they can sustain their speeds for much longer than a cheetah, possibly being able to outrun such predator. As for the "horns" of the pronghorn, they basically have sheath that cover bony cores. This sheath, however, is shed and regrown every year. In comparison, cows have engrained bones covered in keratin, while deer have antlers made purely of bone that fall off. But oh well, they're basically just adaptations that have grown to outrun extinct predators. But not antelopes, as...

Back to Basix (Public Key Encryption)

 I'm gonna repurpose this blog just to talk about school-related/topic-related stuff that isn't heavy. Anyways, I'm gonna talk about public key encryption. ---- Basically, public key encryption is the act of encrypting something. (Like a message) with a public key, in which the receiver will decrypt it using their OWN private key. Actually, your browser does it and is basically the foundation of SSL/TLS (the latter is used today), as well as HTTPS. For example, let's say that Faed wants to send Gigi a secret. And Faed wants to make sure the message gets to Gigi without a middleman listening in and getting sensitive stuff.  So, Gigi posts a public key  on her website. Then, Faed accesses this public key and encrypts her message "I kinda like u <3", using Gigi's public key. When Faed sends the encrypted stuff over, even if a hacker were to get hands on the love message, it would be gibberish without Gigi's private key , which ONLY she possesses.  And ...