Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Introduction to gpg key usage: Revision history

From posixlycorrect wiki

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

28 August 2024

  • curprev 06:1206:12, 28 August 2024Admin talk contribs 9,978 bytes −3 No edit summary
  • curprev 06:1106:11, 28 August 2024Admin talk contribs 9,981 bytes +34 No edit summary
  • curprev 06:1106:11, 28 August 2024Admin talk contribs 9,947 bytes +9,947 Created page with "= Introduction = The following is an introductory tutorial on how to use GPG keys to send secure and trusted messages across the internet. GPG is widely used to send secure and verified messages all over the internet, including in the Linux Kernel project! In order for it to work, everyone has to have a key-pair. Key pairs consist of two cryptographic keys: a public key and a private key. The public key is used to encrypt data or verify digital signatures, and it can..."