Use SSH keys for public key cryptography
Looking for people to look at the security of this - if you see scary things please open issues. You can also open on the 'Use this to do a code review' PR to add comments for specific lines of code. Thanks for the help!