Just the signature algorithm. Hashing isn't nearly as vulnerable as elliptic curve cryptography.

Reply to this note

Please Login to reply.

Discussion

ha thank you for the explanation and what you do i appreciate it