Re: [new-user] question

2012-04-12 Thread Laurent Jumet
Hello michael ! michael crane wrote: > I'm trying to understand the principals and benefits of using pgp/gpg > I think I understand that I send the part of my key that is public to > somebody and they use that key to encrypt a message which only I can > decypher. > So what if somebody uses my p

Re: [new-user] question

2012-04-12 Thread Robert J. Hansen
On 04/12/2012 06:21 PM, michael crane wrote: > what is the mechanism to ensure it came from who I think it did ? Turn it around. The public and the private key are inverses. Each can decrypt what the other one encrypts. When someone encrypts a message with your public key, only your private key

Re: [new-user] question

2012-04-12 Thread brian m. carlson
On Thu, Apr 12, 2012 at 11:21:16PM +0100, michael crane wrote: > hello, > I'm trying to understand the principals and benefits of using pgp/gpg > I think I understand that I send the part of my key that is public to > somebody and they use that key to encrypt a message which only I can > decypher.

[new-user] question

2012-04-12 Thread michael crane
hello, I'm trying to understand the principals and benefits of using pgp/gpg I think I understand that I send the part of my key that is public to somebody and they use that key to encrypt a message which only I can decypher. So what if somebody uses my public key to send me a message purporting to