pgp_workshop
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| pgp_workshop [2025/05/29 07:19] – [Signing and verifying signatures with OpenPGP] usera | pgp_workshop [2025/05/29 07:47] (current) – [The actual Key signing] usera | ||
|---|---|---|---|
| Line 276: | Line 276: | ||
| GPG is a lot based on the trust that you are talking to the right person. Therefore, to tell to the whole world that you trust some public key, you should **sign the public keys** of other people. | GPG is a lot based on the trust that you are talking to the right person. Therefore, to tell to the whole world that you trust some public key, you should **sign the public keys** of other people. | ||
| + | |||
| + | === Note if you used Thunderbird and not Kleopatra === | ||
| + | |||
| + | To sign a key, you need to use the command line gpg, so as said before, if you used Kleopatra to generate your keys, you are good to go, as the gpg tool will already know your keys. However, if you used Thunderbird, | ||
| + | - First, go to the PGP key manager in Thunderbird | ||
| + | - Select the public key you want to sign, then right click and click on Export public key to file and select a location on your computer | ||
| + | - Open a command line, navigate to the folder where your file is and enter '' | ||
| + | - repeat the operaton for each key you want to sign | ||
| + | |||
| + | === The actual Key signing === | ||
| This is how to do it (as recommended [[https:// | This is how to do it (as recommended [[https:// | ||
| - Alice (you) get the public key of Bob | - Alice (you) get the public key of Bob | ||
| - | - Alice sign it with her private key: < | + | - Alice sign it with her private key: '' |
| - | - Alice exports, then encrypts the signed key with Bob public key, with the following command: < | + | - Alice exports, then encrypts the signed key with Bob public key, with the following command: < |
| - Alice emails the key to Bob using the mail address associated with the key | - Alice emails the key to Bob using the mail address associated with the key | ||
| - | - Bob receives it, then decrypt it with his private key and import it: < | + | - Bob receives it, then decrypt it with his private key and import it: '' |
| - | - He can then send it to a keyserver, containing Alice signature: | + | - He can then send it to a keyserver, containing Alice signature: |
pgp_workshop.1748503146.txt.gz · Last modified: by usera
