If anything needs to change it is that the documentation
I can more and more see that thanks to everybody's willingness on
this list to explain.
That is exactly my point, NOBODY should rely on ANY of that
information to
identify a key. The only identifier for a key is the fingerprint.
I suggest that you seriously check our Big Lumber at www.biglumber.com
Thanks John. I will.
Regarding my personal web of trust: I get a clearer picture now and
for starter I'll exchange keys directly with my friends.
As for the "unwanted keys" for my e-mail address. At least for now I
kn
Am I missing something?
The web of trust. (And the documentation, apparently.)
Okay. I got that by now. I think the problem was that MacGPG makes it
really easy to get started with GPG:
There's a plug-in that integrates nicely with Apple's Mail. And the
Keychain Assistant let's
Am I missing something?
The web of trust. (And the documentation, apparently.)
Okay. I got that by now. I think the problem was that MacGPG makes it
really easy to get started with GPG:
There's a plug-in that integrates nicely with Apple's Mail. And the
Keychain Assistant let's you
Thanks David.
I understand that technically there is no software command that I
could send off anywhere that could fix the situation, right?
If you don't have the private key, then yes, right. There is nothing
you can do about it.
I feared so after I read up on all this stuff.
Wow, is it j
I'm still in the process of learning how to use GPG for signing and
encrypting messages. I use MacGPG on, you guessed it, OS X.
The interface of the GPG Keychain app makes it really easy to do some
powerful stuff. And you know how it is, if powerful stuff is put in
the hands of ignorant peo