Hello michael !
michael crane wrote:
> I'm trying to understand the principals and benefits of using pgp/gpg
> I think I understand that I send the part of my key that is public to
> somebody and they use that key to encrypt a message which only I can
> decypher.
> So what if somebody uses my p
On 04/12/2012 06:21 PM, michael crane wrote:
> what is the mechanism to ensure it came from who I think it did ?
Turn it around.
The public and the private key are inverses. Each can decrypt what the
other one encrypts. When someone encrypts a message with your public
key, only your private key
On Thu, Apr 12, 2012 at 11:21:16PM +0100, michael crane wrote:
> hello,
> I'm trying to understand the principals and benefits of using pgp/gpg
> I think I understand that I send the part of my key that is public to
> somebody and they use that key to encrypt a message which only I can
> decypher.
hello,
I'm trying to understand the principals and benefits of using pgp/gpg
I think I understand that I send the part of my key that is public to
somebody and they use that key to encrypt a message which only I can
decypher.
So what if somebody uses my public key to send me a message purporting
to