mick.crane at gmail.com
Fri Apr 13 00:21:16 CEST 2012
I'm trying to understand the principals and benefits of using pgp/gpg
I think I understand that I send the part of my key that is public to
somebody and they use that key to encrypt a message which only I can
So what if somebody uses my public key to send me a message purporting
to come from somebody else ?
what is the mechanism to ensure it came from who I think it did ?
More information about the Gnupg-users