/[winpt]/trunk/doc/winpt.texi
ViewVC logotype

Diff of /trunk/doc/winpt.texi

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

revision 226 by twoaday, Mon Jun 12 13:40:21 2006 UTC revision 227 by twoaday, Wed Jun 14 06:57:57 2006 UTC
# Line 8  This file is free under the terms of the Line 8  This file is free under the terms of the
8    
9  Copyright (C) 2006 Timo Schulz  Copyright (C) 2006 Timo Schulz
10    
11  Version 0.0.0  Version 0.1.0
12    
13  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows  @settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows
14    
# Line 73  and copy it to the clipboard. Line 73  and copy it to the clipboard.
73    
74  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4  Example: 1D75 8108 5BC9 D9FB E78B  2078 ED46 81C9 BF3D F9B4
75    
76    It is a good idea to publish your fingerprint wherever possible.
77    For example via a business card or your website.
78    
79  @section Installation of the Program  @section Installation of the Program
80    
81  It is always recommend to use the latest version of the program. You  It is always recommend to use the latest version of the program. You
# Line 313  step directly after key generation, ther Line 316  step directly after key generation, ther
316  default values. Just select a file name and enter the passphrase.  default values. Just select a file name and enter the passphrase.
317  The program issues a warning which should be read carefully.  The program issues a warning which should be read carefully.
318    
319  @subsection Adding a new secondary key  @subsection Adding a new Secondary Key
320    
321  For most users the existing keys in the key pair are enough  For most users the existing keys in the key pair are enough
322  and no extra key is needed. But there are some exceptions.  and no extra key is needed. But there are some exceptions.
# Line 337  of taste. RSA and ElGamal are both capab Line 340  of taste. RSA and ElGamal are both capab
340  users it's a good idea to let the program chose the key size (in bits).  users it's a good idea to let the program chose the key size (in bits).
341  The default settings should be secure enough for most purposes.  The default settings should be secure enough for most purposes.
342    
343  @subsection Adding a new user ID  @subsection Adding a new User ID
344  If you got a new email account, it's propably a good idea to  If you got a new email account, it's propably a good idea to
345  add these new account to your key also. For example:  add these new account to your key also. For example:
346    
# Line 353  comment: (optional) Line 356  comment: (optional)
356  Now email programs are able to associate this address with your  Now email programs are able to associate this address with your
357  key when somebody wants to send you a protected mail to this account.  key when somebody wants to send you a protected mail to this account.
358    
359  @subsection Adding a photographic ID  @subsection Adding a new Photographic ID
360  With this function you can add a photo to your public. It will be  With this function you can add a photo to your public. It will be
361  displayed in the key property dialog.  displayed in the key property dialog.
362    
# Line 362  enter your passphrase and confirm with O Line 365  enter your passphrase and confirm with O
365  in the dialog carefully to make sure the photo has a proper size  in the dialog carefully to make sure the photo has a proper size
366  (file, height and weight).  (file, height and weight).
367    
368  @subsection Adding a new designated revoker  @subsection Adding a new Designated Revoker
369  If you want to allow another key to revoke your own key, this  If you want to allow another key to revoke your own key, this
370  might be useful if you lost your secret or a simliar situation,  might be useful if you lost your secret or a simliar situation,
371  you can use this function to add a designated revoker to your key.  you can use this function to add a designated revoker to your key.
# Line 396  If the key is stored as an attachment, o Line 399  If the key is stored as an attachment, o
399  a key from a file in general, just drag the file and drop it  a key from a file in general, just drag the file and drop it
400  into the Key Manager window or use "Key" -> "Import...".  into the Key Manager window or use "Key" -> "Import...".
401    
402    @subsection Sign a Public Key
403    If you verified that a key really belongs to its owner, you
404    should sign the key to integrate it into your Web of Trust
405    and also to mark the key as valid in your keyring. Do not sign
406    a key you just got via email with the request to sign it. Anybody
407    can create a key with your (or better ANY) name, these information
408    are no hint to whom the key really belongs. You can check a key
409    by meeting or calling the key owner and verify the key fingerprint
410    of the key with the one published by the key owner. Additional checks
411    should be to watch at his driver license or the identity card to make
412    sure that name of the key matches the name of the key owner. After
413    this procedure is done, you can open the Key Manager, select the
414    right key and either use the context menu "Sign Key" or use the
415    toolbar button.
416    
417    The next dialog will summarize the key information and some
418    additional options. For example if the signature should be
419    local or exportable. Local means the signature will be stripped
420    if you export the key and no one else except you can use it to
421    calculate the validity. If you mark the signature exportable,
422    any other user can see and use it. Now you can select the key
423    you want to use to sign and enter the passphrase. Confirm with "OK"
424    and the key will be signed. Now the validity of the new key is
425    "Full". It is propably a good idea to set the ownertrust of the
426    key. For a detailled description, see the chapter "Key Ownertrust".
427    
428    @subsection Key Ownertrust
429    First we should explain what the ownertrust of a key is. The ownertrust
430    is a measurement how much you trust somebody to certify and check keys
431    of other people. For example, if you know that Bob is really the owner
432    of the key, you should sign it. But he is also known to sign other keys
433    without checking the idenity of the other key owner. Values for the
434    ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full
435    and thus you should propably use an ownertrust value like "Marginal".
436    But this is a personal decision and stored in a separate file and
437    never exported with the public keys. For further information, please
438    take a look into the GNU Privacy Handbook.
439    Just a last work on Key Pairs, they are automatically marked as
440    "Ultimate" because the key belongs to you and you trust it implicit.
441    
442  @bye  @bye

Legend:
Removed from v.226  
changed lines
  Added in v.227

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26