I mean, there are software libraries that handle encryption for you. I’m imagining that OP is thinking of some kind of scenario where it becomes illegal to distribute communication software without ID verification, and people must write their own client programs, which is not an impossible task.
trxxruraxvr@lemmy.world 14 hours ago
You still need to know what you are doing to use them correctly and not introduce vulnerabilities.
chicken@lemmy.dbzer0.com 13 hours ago
If the library is high level enough that it is for the communication protocol itself, of which there are lots, it will probably be fine. Even if you aren’t rolling your own code in this scenario, it would still be useful to learn because it may be hard to verify trustworthy sources of illegal software without reading the source code yourself.