On 9/1/06, Steve Smith <[EMAIL PROTECTED]> wrote:
> I'm trying to get to the bottom of what GPG is and how it works.  I
> can't find a description that covers the absolute basics of what it
> is, would anyone care to explain to me?  Does it have anything to do
> at all with the actual computer you create it on, or is it just
> completely random?  How does it actually provide proof of
> identification, etc in practise?

That's a long and involved topic, I'm afraid. I'd start with the
fairly good Wikipedia article on public-key cryptography:

http://en.wikipedia.org/wiki/Public-key_cryptography

And then move on to the GnuPG (GPG) handbook:

http://www.gnupg.org/gph/en/manual.html

It's not something that can really be summed up in a few sentences in
an email message. I assume you are interested because you need a GPG
key to sign the Code of Conduct? You could probably jump right to the
GPG handbook if you don't need convincing on how public-key
cryptography works.

-Eamonn

-- 
ubuntu-uk mailing list
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk

Reply via email to