This is from the last slide I was displaying. - Each person should upload their key to a keyserver
- Each of us will take your copy of other peoples fingerprints - You should sign each key you accept as properly authenticated. - E-mail the signed key to the E-mail address that is part of the UserID. Encrypt the signed key to verify that only the key owner receives it. Do not post the key to a public key server. The keys I sent are encrypted to your public keys and signed by my key. Don't try to process the email as it is, it requires decryption before it can be used. Scott -- Scott Murphy, CISSP Owner & Consultant | Arrow-Eye Consulting Inc. 112 Springcreek Cres. | Kanata | ON | K2M 2K8 | Canada O: 613-270-1387 | C: 613-769-9363 email: scott.mur...@arrow-eye.com | web: http://www.arrow-eye.com _______________________________________________ Linux mailing list Linux@lists.oclug.on.ca http://oclug.on.ca/mailman/listinfo/linux