This is from the last slide I was displaying.

- Each person should upload their key to a keyserver 

- Each of us will take your copy of other peoples fingerprints

- You should sign each key you accept as properly authenticated.

- E-mail the signed key to the E-mail address that is part of the UserID.  
  Encrypt the signed key to verify that only the key owner receives it. 
  Do not post the key to a public key server.

The keys I sent are encrypted to your public keys and signed by my key. Don't 
try to process the email as it is, it requires decryption before it can be used.

Scott
-- 
Scott Murphy, CISSP
Owner & Consultant  | Arrow-Eye Consulting Inc.
112 Springcreek Cres. | Kanata | ON | K2M 2K8 | Canada
O: 613-270-1387 | C: 613-769-9363
email: scott.mur...@arrow-eye.com | web: http://www.arrow-eye.com 

_______________________________________________
Linux mailing list
Linux@lists.oclug.on.ca
http://oclug.on.ca/mailman/listinfo/linux

Reply via email to