<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, Nov 19, 2014 at 10:39 AM, Maxwell Krohn <span dir="ltr"><<a href="mailto:themax@gmail.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=themax@gmail.com&cc=&bcc=&su=&body=','_blank');return false;">themax@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word"><div><div class="h5"><span style="color:rgb(34,34,34)">The tweeted hash is computed over the key fingerprint and the signature. </span></div></div></div></blockquote><div><br></div><div>Okay, perhaps I have simply fundamentally understood what was in the contents of the tweets. That sounds fine to me. </div></div><div><br></div>-- <br><div class="gmail_signature">Tony Arcieri<br></div>
</div></div>