Back to Public Key Cryptography
Previous: Importing Public Keys
Next: gpg man page
- In order to use a key, that key must also be trusted.
- Once a key is trusted at a high-enough trust level, signing a key will no longer be necessary to use it.
- A key can become trusted it by signing it or explicitly trusting it.
- For a summary of how trust relationships work and the Web of Trust model, see here.
...