Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Back to Public Key Cryptography 
Previous: Importing Public Keys
Next: gpg man page


  • In order to use a key, that key must also be trusted.
  • Once a key is trusted at a high-enough trust level, signing a key will no longer be necessary to use it.
  • A key can become trusted it by signing it or explicitly trusting it.
  • For a summary of how trust relationships work and the Web of Trust model, see here.

...