Are any of you good with Cryptography? Can you explain to me how Digital Signatures work? Sources i find on the internet just dont really seem to get through to me
you have two keys: a private key, and a public key
as the names indicate, one you don't show anyone, and other, you show everyone (who has use for it). I would hope you can figure out which is which
the relationship between the two keys is neat because you can use one to encrypt something, and the other can decrypt it. it doesn't matter which one is being used for which operation, the other will always be able to decrypt (unless you're using some weird cryptosystem I guess)
signatures are when you use some hash function on the entire message you are sending, encrypt it with one of the keys, and include that encrypted bit along with sending the actual message (encrypted or unencrypted). the point of hashing it first is so that you're not using RSA or whatever to encrypt the entire message
then, when the message is received, it's (decrypted if encrypted, then) hashed, and the signature (the original hash, from the very first part) is decrypted using the corresponding key, then they check if the hashes match. if so, great. otherwise, fricked
if ANY part of the message differed from the original, or ANY part of the signature differed from the original, then the hashes will not match, indicating that something has been tampered with/corrupted. as a side effect, it also proves that the sender is who they say they are (or at least, that they are the person who has the private key that corresponds to the public key they gave you)
disclaimer: it's very likely that I have not helped you understand at all
It depends on which type of public-key cryptosystem you're using. With RSA, it's some modular arithmetic that's quite similar to how you encrypt a message. In systems like ECC, it's much more complex.
ippy baby I think you're misunderstanding the question (or am i wow)
does anyone know whats the risk of trying to use recovery software on your boot drive? it seems every type of software out there discourages you from doing it.
if, for some godforsaken reason, the recovery software automatically takes action on the things it discovers, then no, you should not use it on anything sensitive, or in fact anything at all just on principle. recuva, for instance, does no writing until you specifically tell it to, and is therefore completely harmless