Chapter 6

Working with Public Keys

“Sam, it seems I should have some better way to find a person’s public key. And how can I be sure a public key belongs to the person I think it belongs to?” asks Bob. “And, you said something earlier about revoking keys….”

“All excellent questions,” Sam replies. “Because you will be working with keys now, you should know more including using public keyservers, revoking keys, editing keys, and most important, deciding whether or not to trust a key. We’ll get to all those things in good time; first, let’s talk about trusting a public key.”

6.1 Trusting a Public Key

Sam says: “‘Trust but verify’ also applies to public keys. For example, consider keyservers: they are public servers hosting user-generated content. Just ...

Get Simple Steps to Data Encryption now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.