Trump officials shared military plans on a private app — 10 years after uproar over Hillary Clinton’s private server
Arcka @ Arcka @midwest.social Posts 0Comments 97Joined 2 yr. ago
Arcka @ Arcka @midwest.social
Posts
0
Comments
97
Joined
2 yr. ago
That's literally the defining feature of asymmetric cryptography. There are many explanations of how it works which you can easily find. One example is the Wikipedia article: https://en.m.wikipedia.org/wiki/Public-key_cryptography
If you educate yourself and are still confused, you should probably just accept the fact that even though you can't understand the specifics, information encoded with the public key cannot be decoded with the same public key.