[new-user] question
Laurent Jumet
laurent.jumet at skynet.be
Fri Apr 13 07:31:06 CEST 2012
Hello michael !
michael crane <mick.crane at gmail.com> wrote:
> I'm trying to understand the principals and benefits of using pgp/gpg
> I think I understand that I send the part of my key that is public to
> somebody and they use that key to encrypt a message which only I can
> decypher.
> So what if somebody uses my public key to send me a message purporting
> to come from somebody else ?
> what is the mechanism to ensure it came from who I think it did ?
You are refering to the 2nd part of crypting: signature.
Crypting to your key is only to ensure that you'll be the only one to read it, but you are supposed to know what you'll find in the message.
Signing is dedicated to the receipient: it allows him to be sure that the message comes from exactly you.
--
Laurent Jumet
KeyID: 0xCFAF704C
More information about the Gnupg-users
mailing list