{"id":181,"date":"2025-09-10T03:17:02","date_gmt":"2025-09-09T23:47:02","guid":{"rendered":"https:\/\/ravensms.net\/ravensms\/?post_type=work&#038;p=181"},"modified":"2025-09-10T21:15:44","modified_gmt":"2025-09-10T17:45:44","slug":"181","status":"publish","type":"work","link":"https:\/\/ravensms.net\/ravensms\/work\/181\/","title":{"rendered":"Connection Security"},"content":{"rendered":"\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a414fc9\"><h2 class=\"uagb-heading-text\">The Simple Story: Alice and Bob&#8217;s Secret Handshake<\/h2><\/div>\n\n\n\n<p>Alice and Bob want to send each other private text messages (SMS) that no one else can read, not even their phone company.<\/p>\n\n\n\n<p>They will use a Secret Code (an AES symmetric key) to lock and unlock their messages. The hard part is agreeing on what that Secret Code is without anyone else finding out.<\/p>\n\n\n\n<p><strong>The &#8220;Connection Request&#8221; (Step 1)<\/strong><\/p>\n\n\n\n<p>This is how they start the secret handshake. Alice begins.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"1024\" src=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-713x1024.png\" alt=\"\" class=\"wp-image-219\" srcset=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-713x1024.png 713w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-209x300.png 209w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-768x1103.png 768w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-1070x1536.png 1070w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-1426x2048.png 1426w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png 1642w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/figure>\n\n\n\n<p>What&#8217;s Happening?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Alice&#8217;s phone creates a special, unique lockbox and key. The lockbox is her Public Key (anyone can use it to lock something). The key to open it is her Private Key (she must keep this secret forever).<\/li>\n\n\n\n<li>She sends the open lockbox (Public Key) to Bob.<\/li>\n\n\n\n<li>Bob&#8217;s phone looks at this lockbox and calculates a short &#8220;Fingerprint&#8221; (a CRC16 checksum) for it. This is like describing the lockbox&#8217;s color and size (&#8220;big blue lockbox&#8221;).<\/li>\n\n\n\n<li>The Critical Check: Bob calls Alice and reads the fingerprint to her: &#8220;Hey Alice, the fingerprint is 4B2A.&#8221; Alice checks it against the fingerprint of the lockbox she sent. If it matches, Bob knows he received the correct, unaltered lockbox.<\/li>\n<\/ol>\n\n\n\n<p><strong>The &#8220;Connection Response&#8221; (Step 2)<\/strong><\/p>\n\n\n\n<p>Now Bob has Alice&#8217;s lockbox. It&#8217;s time to put the Secret Code inside and send it back.<\/p>\n\n\n\n<div class=\"wp-block-uagb-image uagb-block-d1587973 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-2-trans-695x1024.png ,https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-2-trans-scaled.png 780w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-2-trans-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-2-trans-695x1024.png\" alt=\"\" class=\"uag-image-221\" width=\"2205\" height=\"3249\" title=\"ravesnsms-connection-diagram-2-trans\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<p>What&#8217;s Happening?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Bob&#8217;s phone creates the Secret Code (a random AES-192\/256 key).<\/li>\n\n\n\n<li>He puts this code into Alice&#8217;s public lockbox and snaps it shut. Now, only Alice&#8217;s private key can open it. This is the Encrypted AES Key.<\/li>\n\n\n\n<li>Bob&#8217;s phone calculates a &#8220;Fingerprint&#8221; (CRC16) of this locked box.<\/li>\n\n\n\n<li>He sends the locked box to Alice.<\/li>\n\n\n\n<li>The Final Check: Bob calls Alice and reads the fingerprint of the locked box he sent. Alice receives the box, calculates its own fingerprint, and compares. If they match, she knows the box wasn&#8217;t tampered with. She then uses her private key to open it and get the Secret Code.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-bb5ba7c5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">The Security Victory<\/h3><\/div><p class=\"uagb-ifb-desc\">Even if Mallory swapped the lockbox in Step 1,this step is much harder to hack. The locked box contains Bob&#8217;s secret code. To create a new locked box for Alice that has the same fingerprint, Mallory would have to guess Bob&#8217;s secret code and break the math behind the lockbox in a fraction of a second, which is practically impossible.<\/p><\/div><\/div>\n\n\n\n<p><strong>How Messaging Works (The SMS Part)<\/strong><\/p>\n\n\n\n<p>Now that both have the same Secret Code (AES key), they can start texting privately.<\/p>\n\n\n\n<p>Sending a Message (Alice):<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Alice types a message: &#8220;Meet me at 5pm.&#8221;<\/li>\n\n\n\n<li>Her phone uses the Secret Code (AES) to scramble (encrypt) the message into gibberish like <em><code>X4J8k3nD0dL1pQ9aZ2<\/code><\/em>.<\/li>\n\n\n\n<li>She sends this gibberish via normal SMS.<\/li>\n<\/ol>\n\n\n\n<p>Receiving a Message (Bob):<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Bob receives the gibberish SMS: <code><em>X4J8k3nD0dL1pQ9aZ2<\/em><\/code>.<\/li>\n\n\n\n<li>His phone uses the same Secret Code (AES) to unscramble (decrypt) it back into &#8220;Meet me at 5pm.&#8221;<\/li>\n<\/ol>\n\n\n\n<p>Why is this secure? Even if Mallory intercepts the SMS, all she sees is the gibberish. Without the Secret Code, she cannot turn it back into the real message. The AES encryption is incredibly strong.<\/p>\n\n\n\n<p>Overall Picture &amp; Summary<\/p>\n\n\n\n<p>The following sequence diagram brings the entire process together, showing the classic Man-in-the-Middle (MITM) attack vector and how the out-of-band verification thwarts it:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"802\" height=\"1024\" src=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-802x1024.png\" alt=\"\" class=\"wp-image-217\" style=\"width:840px;height:auto\" srcset=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-802x1024.png 802w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-235x300.png 235w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-768x980.png 768w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-1204x1536.png 1204w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-1605x2048.png 1605w, https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-3-trans-scaled.png 2006w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/figure>\n\n\n\n<p>In a nutshell:<\/p>\n\n\n\n<p>\u00b7 <strong>Shared Secret:<\/strong> We use a slow, super-strong method (RSA) to safely agree on a fast, strong Secret Code (AES).<br>\u00b7 <strong>The Handshake:<\/strong> The &#8220;Connection Request&#8221; and &#8220;Connection Response&#8221; are that handshake.<br>\u00b7 <strong>The Strength:<\/strong> The system is designed so that if a hacker tries to mess with the handshake, you both find out during the phone call verification steps.<br>\u00b7 <strong>The Result:<\/strong> Once the handshake is done, you can send endless private messages over SMS with total security.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Simple Story: Alice and Bob&#8217;s Secret Handshake Alice and Bob want to send each other private text messages (SMS) that no one else can read, not even their phone company. They will use a Secret Code (an AES symmetric key) to lock and unlock their messages. The hard part is agreeing on what that Secret Code is without anyone else finding out. The &#8220;Connection Request&#8221; (Step 1) This is how they start the secret handshake. Alice begins. What&#8217;s Happening? The &#8220;Connection Response&#8221; (Step 2) Now Bob has Alice&#8217;s lockbox. It&#8217;s time to put the Secret Code inside and send it back. What&#8217;s Happening? How Messaging Works (The SMS Part) Now that both have the same Secret Code (AES key), they can start texting privately. Sending a Message (Alice): Receiving a Message (Bob): Why is this secure? Even if Mallory intercepts the SMS, all she sees is the gibberish. Without&hellip;<\/p>\n<p> <a class=\"more-link\" href=\"https:\/\/ravensms.net\/ravensms\/work\/181\/\">Read more<\/a><\/p>\n","protected":false},"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","work_genre":[],"class_list":["post-181","work","type-work","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Connection Security - RavenSMS - Secure Protocol<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ravensms.net\/ravensms\/work\/181\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connection Security - RavenSMS - Secure Protocol\" \/>\n<meta property=\"og:description\" content=\"The Simple Story: Alice and Bob&#8217;s Secret Handshake Alice and Bob want to send each other private text messages (SMS) that no one else can read, not even their phone company. They will use a Secret Code (an AES symmetric key) to lock and unlock their messages. The hard part is agreeing on what that Secret Code is without anyone else finding out. The &#8220;Connection Request&#8221; (Step 1) This is how they start the secret handshake. Alice begins. What&#8217;s Happening? The &#8220;Connection Response&#8221; (Step 2) Now Bob has Alice&#8217;s lockbox. It&#8217;s time to put the Secret Code inside and send it back. What&#8217;s Happening? How Messaging Works (The SMS Part) Now that both have the same Secret Code (AES key), they can start texting privately. Sending a Message (Alice): Receiving a Message (Bob): Why is this secure? Even if Mallory intercepts the SMS, all she sees is the gibberish. Without&hellip;  Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ravensms.net\/ravensms\/work\/181\/\" \/>\n<meta property=\"og:site_name\" content=\"RavenSMS - Secure Protocol\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-10T17:45:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1642\" \/>\n\t<meta property=\"og:image:height\" content=\"2358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/\",\"url\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/\",\"name\":\"Connection Security - RavenSMS - Secure Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-713x1024.png\",\"datePublished\":\"2025-09-09T23:47:02+00:00\",\"dateModified\":\"2025-09-10T17:45:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ravensms.net\/ravensms\/work\/181\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage\",\"url\":\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png\",\"contentUrl\":\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png\",\"width\":1642,\"height\":2358},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/work\/181\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ravensms.net\/ravensms\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Connection Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/#website\",\"url\":\"https:\/\/ravensms.net\/ravensms\/\",\"name\":\"RavenSMS - Secure SMS Protocol\",\"description\":\"Android Application, Secure SMS, SMS Encryption, E2EE, Secure Messaging, Secure Chat\",\"publisher\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ravensms.net\/ravensms\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/#organization\",\"name\":\"Green Electronics\",\"url\":\"https:\/\/ravensms.net\/ravensms\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ravensms.net\/ravensms\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/08\/icon.png\",\"contentUrl\":\"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/08\/icon.png\",\"width\":100,\"height\":60,\"caption\":\"Green Electronics\"},\"image\":{\"@id\":\"https:\/\/ravensms.net\/ravensms\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Connection Security - RavenSMS - Secure Protocol","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ravensms.net\/ravensms\/work\/181\/","og_locale":"en_US","og_type":"article","og_title":"Connection Security - RavenSMS - Secure Protocol","og_description":"The Simple Story: Alice and Bob&#8217;s Secret Handshake Alice and Bob want to send each other private text messages (SMS) that no one else can read, not even their phone company. They will use a Secret Code (an AES symmetric key) to lock and unlock their messages. The hard part is agreeing on what that Secret Code is without anyone else finding out. The &#8220;Connection Request&#8221; (Step 1) This is how they start the secret handshake. Alice begins. What&#8217;s Happening? The &#8220;Connection Response&#8221; (Step 2) Now Bob has Alice&#8217;s lockbox. It&#8217;s time to put the Secret Code inside and send it back. What&#8217;s Happening? How Messaging Works (The SMS Part) Now that both have the same Secret Code (AES key), they can start texting privately. Sending a Message (Alice): Receiving a Message (Bob): Why is this secure? Even if Mallory intercepts the SMS, all she sees is the gibberish. Without&hellip;  Read more","og_url":"https:\/\/ravensms.net\/ravensms\/work\/181\/","og_site_name":"RavenSMS - Secure Protocol","article_modified_time":"2025-09-10T17:45:44+00:00","og_image":[{"width":1642,"height":2358,"url":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/","url":"https:\/\/ravensms.net\/ravensms\/work\/181\/","name":"Connection Security - RavenSMS - Secure Protocol","isPartOf":{"@id":"https:\/\/ravensms.net\/ravensms\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage"},"image":{"@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage"},"thumbnailUrl":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans-713x1024.png","datePublished":"2025-09-09T23:47:02+00:00","dateModified":"2025-09-10T17:45:44+00:00","breadcrumb":{"@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ravensms.net\/ravensms\/work\/181\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/#primaryimage","url":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png","contentUrl":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/09\/ravesnsms-connection-diagram-1-trans.png","width":1642,"height":2358},{"@type":"BreadcrumbList","@id":"https:\/\/ravensms.net\/ravensms\/work\/181\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ravensms.net\/ravensms\/"},{"@type":"ListItem","position":2,"name":"Connection Security"}]},{"@type":"WebSite","@id":"https:\/\/ravensms.net\/ravensms\/#website","url":"https:\/\/ravensms.net\/ravensms\/","name":"RavenSMS - Secure SMS Protocol","description":"Android Application, Secure SMS, SMS Encryption, E2EE, Secure Messaging, Secure Chat","publisher":{"@id":"https:\/\/ravensms.net\/ravensms\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ravensms.net\/ravensms\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ravensms.net\/ravensms\/#organization","name":"Green Electronics","url":"https:\/\/ravensms.net\/ravensms\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ravensms.net\/ravensms\/#\/schema\/logo\/image\/","url":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/08\/icon.png","contentUrl":"https:\/\/ravensms.net\/ravensms\/wp-content\/uploads\/2025\/08\/icon.png","width":100,"height":60,"caption":"Green Electronics"},"image":{"@id":"https:\/\/ravensms.net\/ravensms\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"a13_navigation_image_size":false},"uagb_author_info":{"display_name":"RavenSMS Dev.","author_link":"https:\/\/ravensms.net\/ravensms\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"The Simple Story: Alice and Bob&#8217;s Secret Handshake Alice and Bob want to send each other private text messages (SMS) that no one else can read, not even their phone company. They will use a Secret Code (an AES symmetric key) to lock and unlock their messages. The hard part is agreeing on what that&hellip;","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/work\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/work"}],"about":[{"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/types\/work"}],"replies":[{"embeddable":true,"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/comments?post=181"}],"wp:attachment":[{"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/media?parent=181"}],"wp:term":[{"taxonomy":"work_genre","embeddable":true,"href":"https:\/\/ravensms.net\/ravensms\/wp-json\/wp\/v2\/work_genre?post=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}