O'Reilly logo

Simple Steps to Data Encryption by Peter Loshin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Working with Public Keys

“Sam, it seems I should have some better way to find a person’s public key. And how can I be sure a public key belongs to the person I think it belongs to?” asks Bob. “And, you said something earlier about revoking keys….”

“All excellent questions,” Sam replies. “Because you will be working with keys now, you should know more including using public keyservers, revoking keys, editing keys, and most important, deciding whether or not to trust a key. We’ll get to all those things in good time; first, let’s talk about trusting a public key.”

6.1 Trusting a Public Key

Sam says: “‘Trust but verify’ also applies to public keys. For example, consider keyservers: they are public servers hosting user-generated content. Just ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required