Changes between Version 23 and Version 24 of gpg
- Timestamp:
- Jan 25, 2009, 7:14:31 PM (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
gpg
v23 v24 6 6 For most of us, when we first decide we want to encrypt our email, we only think about one half of the equation: scrambling our message in a way that only the intended recipient can read it. 7 7 8 A second, and equally important component that is often over looked is authenticity. If someone sends you a secret message, how do you know it was sent by the person who is claiming to have sent it? 8 A second, and equally important component that is often over looked is authenticity. If someone sends you a secret message, how do you know it was sent by the person who is claiming to have sent it? A little known fact about the Internet is that forging the from address in an email message is just about as easy as forging the from address on a postal letter. 9 9 10 10 Encryption (scrambling your message) and authenticity (knowing who really sent the message) are the two pillars of secure communication. You must have both to securely send private messages between two parties.