Hi Gami,

>>>>> "Dhruv" == Dhruv Gami <[EMAIL PROTECTED]> writes:

    Dhruv> Hello Everyone, I've recently been experimenting with GPG
    Dhruv> and created a nice gpg key for my email. Sent off my public
    Dhruv> key to some of my friends and have been interacting with
    Dhruv> some of them "secretly". Its quite a nice feeling to know
    Dhruv> its secure.

    Dhruv> I have a few queries though :

    Dhruv> 1. How safe is it(GPG/PGP) really ? I believe its quite
    Dhruv> safe... or am i living in a sense of false security ??

It's only as safe as the trust you assign to other peoples' keys.
Unless you have verified that the key that you're encrypting your
messages with actually belongs to the person you are sending the
message to, the message is potentially still insecure.

Verifying could be as simple as picking up the phone, dialing a number
and asking for his/her key fingerprint (for people you know) or could
include verification of drivers license, passport, etc for people you
don't know.

    Dhruv> 2. I made my keys on a RH 8.0 box, and now plan to migrate
    Dhruv> to debian. How do i take my keys along ? Do i simply export
    Dhruv> them from here and import them there ? Would that work ? Or
    Dhruv> should i also copy my .gnupg directory ?  Or is there
    Dhruv> something else that needs to be done ?

Just copy your .gnupg directory to the new system.

    Dhruv> 3. Are there any rules/netiquettes for gpg/pgp keys ? Do i
    Dhruv> need to publish my key somewhere ? Any servers ?

Yes, you can upload your key to keyserver.net.

    Dhruv> 4. What is a key-signing party ? If many people on
    Dhruv> linux-delhi have gpg/pgp keys, then maybe we should have
    Dhruv> one in the next meet. I remember there being a key-signing
    Dhruv> party a couple of years back when Raj had given a talk on
    Dhruv> GPG. I was too young to understand all that then, but now i
    Dhruv> realise what all he was talking about.

Maybe we can have a key-signing party at the next Meet.  Let me read
the docs about what is required again.

The idea in a key-signing party is that everyone who participates
makes their GPG key finger print available beforehand.  At the party
itself each person then brings proof of identity (e.g. passport) and
proves that s/he is who s/he claims to be.  Once you are convinced of
that person's identity you go back home, sign the key that corresponds
to the fingerprint and upload it to the keyserver.  Finally you end up
with a number of mutually-signed keys.

    Dhruv> 5. Any other comments ?

GPG is actually used for two primary purposes: encrypting text
(privacy) and signing it (non-repudiability and identity).  I find
both functions equally important.

Regards,

-- Raju

    Dhruv> regards, Gami

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
                      It is the mind that moves

          ================================================
To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject header. 
Check archives at http://www.mail-archive.com/ilugd%40wpaa.org

Reply via email to