Also, I'd like to point out that copying is essentially protected against, just not completely because it cannot be. So if you sign a message "hello world" and I can verify with your public key that this was signed by you on May 25, 2016 at 10:52AM, then I can in theory copy that entire message and its corresponding signature and impersonate you at that immediate time. Say you had signed a message "Yes, this is me, John Alcorn" at that time and date, 10:52AM. I could take that and go somewhere else and post that whole message and it would verify. Now, I could not sign any further messages with the key, so its of limited use. Also, as time passes, this becomes basically pointless, as it will have been signed in the past and the copier could not sign any new message (which they had never been able to do). So it's not a very /practical/ exploit. It's worth mentioning though, as the alteration of a signed message by someone other than the owner of the private key is completely impossible.
Listen up faggots
Adrian Watson
Henry Harris
>I'm going to go do some research and see if I can learn all there is to know about using blockchains
lol
I'mma go learn how to build mathematical trading models to make big $$$...
looking to skim a few books over the weekend and get my first six figure finance job by Monday!