# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 5
# self = https://watcher.sour.is/conv/c37vmmq
This video here, How Encryption Keys Work, is one of the best videos I've seen that explains in simple terms how important that little padlock in a browser is.

Just as a heads-up this is a YouTube link.
@ullarah Or in the case of Salty IM a βœ… to shower that you have verified (ideally out-of-band) the recipient's public key and that it hasn't changed mid-way through a conversation or since you last spoke to them πŸ‘Œ
@ullarah Or in the case of Salty IM a βœ… to shower that you have verified (ideally out-of-band) the recipient's public key and that it hasn't changed mid-way through a conversation or since you last spoke to them πŸ‘Œ
@prologic know of a simplified way of explaining how 2FA works? I haven’t found anything useful that would explain 2FA to a 6 year old.

Similar to the video posted in the original post would be awesome!
@ullarah well, I got 2 videos I use in class. Not exactly for a 6 year old, but could be helpful

YouTube - How HOTP and TOTP work

YouTube - How does the Google Authenticator Work? HOTP TOTP Difference | 2FA Authentication