Hacker News new | past | comments | ask | show | jobs | submit login

It’s not actually much different. The main reason to use this is because it’s the standardized version of that concept and has been analyzed by people. All the smaller cryptographic detailed like domain separation, proper key derivation, weak key rejection etc. have been worked out for you. So it’s a plug and play solution that previously didn’t exist.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: