GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Blue Ghost (blueghost@mastodon.online)'s status on Sunday, 03-Dec-2023 17:41:08 JSTBlue GhostBlue Ghost
    • LibreOffice

    LibreOffice supports symmetric and asymmetric encryption for OpenDocument Format (ODF) files.

    Symmetric encryption: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
    Asymmetric encryption: https://en.wikipedia.org/wiki/Public-key_cryptography

    Select File > Save/Save As

    The "Save with password" option encrypts the file with AES-256.
    The "Encrypt with GPG key" option encrypts the file with a public key.

    Website: https://www.libreoffice.org
    Mastodon: @libreoffice

    #LibreOffice #Encryption #OpenSource #OpenPGP #PGP #GnuPG #GPG #InfoSec #Privacy #Security

    In conversationSunday, 03-Dec-2023 17:41:08 JST from mastodon.onlinepermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.libreoffice.org
      Home | LibreOffice - Free Office Suite - Based on OpenOffice - Compatible with Microsoft
      Free office suite – the evolution of OpenOffice. Compatible with Microsoft .doc, .docx, .xls, .xlsx, .ppt, .pptx. Updated regularly, community powered.

    2. https://files.mastodon.online/media_attachments/files/111/515/310/525/515/435/original/59c98b7638e467c5.png
    3. Domain not in remote thumbnail source whitelist: upload.wikimedia.org
      Symmetric-key algorithm
      Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption (also known as asymmetric-key encryption). However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption. Types Symmetric-key encryption can use either stream ciphers or block ciphers.Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one at a time. An example is ChaCha20. Substitution...

  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.