No edit summary |
m (Remove level 1 header.) |
||
(6 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
<!-- page was renamed from DocsProject/UsingGpg | <!-- page was renamed from DocsProject/UsingGpg | ||
--> | --> | ||
<!--language: | <!--language:en | ||
--> | --> | ||
{{lang|en|es|ru|page=Using GPG}} | |||
= Using the GNU Privacy Guard (GnuPG/GPG) = | == Using the GNU Privacy Guard (GnuPG/GPG) == | ||
GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message. | GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message. | ||
Line 31: | Line 32: | ||
== Official GPG Links == | == Official GPG Links == | ||
* [ | * [https://www.gnupg.org/ GPG Home Page] | ||
* [ | * [https://www.gnupg.org/documentation/ Official GPG Documentation] | ||
== About Public Key Encryption == | == About Public Key Encryption == | ||
* [ | * [https://en.wikipedia.org/wiki/Public-key_cryptography Wikipedia - Public Key Cryptography] | ||
* [ | * [https://computer.howstuffworks.com/encryption.htm HowStuffWorks - Encryption] | ||
[[Category:Documentation]] | [[Category:Documentation]] |
Latest revision as of 09:58, 7 April 2020
Using the GNU Privacy Guard (GnuPG/GPG)
GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message.
To participate in any part of the Fedora Project,
- You should have a GPG key pair.
- Your public key should be available on pgp.mit.edu.
If you associate a GPG public key with your Fedora Account system account, you can later use that key to securely identify yourself in the event you lost access to the email address associated with your Fedora Account.
Quick Start Guides
Using GPG with email clients:
Using GPG with webmail email clients:
Official GPG Links