The true power of GPG keys is when they are used to communicate with others. It will also discuss exporting, adding, and removing keys, using sub-keys and retrieving public keys. This final installment will cover managing GPG keys in greater depth, including the Web of Trust and key signing parties. The third article in the series covered using your key to sign and encrypt files or communications. ![]() ![]() In the second installment, key creation and publication were covered, as well as revocation certificate creation. You learned about integrity, non-repudiation and authenticity. In the first installment, we covered the functions of GPG. Welcome back to the GPG series, where we are exploring how to make use of GPG with other applications to secure and protect your data.
0 Comments
Leave a Reply. |