8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.0.0 |
Version 0.1.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
14 |
|
|
73 |
|
|
74 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
75 |
|
|
76 |
|
It is a good idea to publish your fingerprint wherever possible. |
77 |
|
For example via a business card or your website. |
78 |
|
|
79 |
@section Installation of the Program |
@section Installation of the Program |
80 |
|
|
81 |
It is always recommend to use the latest version of the program. You |
It is always recommend to use the latest version of the program. You |
316 |
default values. Just select a file name and enter the passphrase. |
default values. Just select a file name and enter the passphrase. |
317 |
The program issues a warning which should be read carefully. |
The program issues a warning which should be read carefully. |
318 |
|
|
319 |
@subsection Adding a new secondary key |
@subsection Adding a new Secondary Key |
320 |
|
|
321 |
For most users the existing keys in the key pair are enough |
For most users the existing keys in the key pair are enough |
322 |
and no extra key is needed. But there are some exceptions. |
and no extra key is needed. But there are some exceptions. |
340 |
users it's a good idea to let the program chose the key size (in bits). |
users it's a good idea to let the program chose the key size (in bits). |
341 |
The default settings should be secure enough for most purposes. |
The default settings should be secure enough for most purposes. |
342 |
|
|
343 |
@subsection Adding a new user ID |
@subsection Adding a new User ID |
344 |
If you got a new email account, it's propably a good idea to |
If you got a new email account, it's propably a good idea to |
345 |
add these new account to your key also. For example: |
add these new account to your key also. For example: |
346 |
|
|
356 |
Now email programs are able to associate this address with your |
Now email programs are able to associate this address with your |
357 |
key when somebody wants to send you a protected mail to this account. |
key when somebody wants to send you a protected mail to this account. |
358 |
|
|
359 |
@subsection Adding a photographic ID |
@subsection Adding a new Photographic ID |
360 |
With this function you can add a photo to your public. It will be |
With this function you can add a photo to your public. It will be |
361 |
displayed in the key property dialog. |
displayed in the key property dialog. |
362 |
|
|
365 |
in the dialog carefully to make sure the photo has a proper size |
in the dialog carefully to make sure the photo has a proper size |
366 |
(file, height and weight). |
(file, height and weight). |
367 |
|
|
368 |
@subsection Adding a new designated revoker |
@subsection Adding a new Designated Revoker |
369 |
If you want to allow another key to revoke your own key, this |
If you want to allow another key to revoke your own key, this |
370 |
might be useful if you lost your secret or a simliar situation, |
might be useful if you lost your secret or a simliar situation, |
371 |
you can use this function to add a designated revoker to your key. |
you can use this function to add a designated revoker to your key. |
399 |
a key from a file in general, just drag the file and drop it |
a key from a file in general, just drag the file and drop it |
400 |
into the Key Manager window or use "Key" -> "Import...". |
into the Key Manager window or use "Key" -> "Import...". |
401 |
|
|
402 |
|
@subsection Sign a Public Key |
403 |
|
If you verified that a key really belongs to its owner, you |
404 |
|
should sign the key to integrate it into your Web of Trust |
405 |
|
and also to mark the key as valid in your keyring. Do not sign |
406 |
|
a key you just got via email with the request to sign it. Anybody |
407 |
|
can create a key with your (or better ANY) name, these information |
408 |
|
are no hint to whom the key really belongs. You can check a key |
409 |
|
by meeting or calling the key owner and verify the key fingerprint |
410 |
|
of the key with the one published by the key owner. Additional checks |
411 |
|
should be to watch at his driver license or the identity card to make |
412 |
|
sure that name of the key matches the name of the key owner. After |
413 |
|
this procedure is done, you can open the Key Manager, select the |
414 |
|
right key and either use the context menu "Sign Key" or use the |
415 |
|
toolbar button. |
416 |
|
|
417 |
|
The next dialog will summarize the key information and some |
418 |
|
additional options. For example if the signature should be |
419 |
|
local or exportable. Local means the signature will be stripped |
420 |
|
if you export the key and no one else except you can use it to |
421 |
|
calculate the validity. If you mark the signature exportable, |
422 |
|
any other user can see and use it. Now you can select the key |
423 |
|
you want to use to sign and enter the passphrase. Confirm with "OK" |
424 |
|
and the key will be signed. Now the validity of the new key is |
425 |
|
"Full". It is propably a good idea to set the ownertrust of the |
426 |
|
key. For a detailled description, see the chapter "Key Ownertrust". |
427 |
|
|
428 |
|
@subsection Key Ownertrust |
429 |
|
First we should explain what the ownertrust of a key is. The ownertrust |
430 |
|
is a measurement how much you trust somebody to certify and check keys |
431 |
|
of other people. For example, if you know that Bob is really the owner |
432 |
|
of the key, you should sign it. But he is also known to sign other keys |
433 |
|
without checking the idenity of the other key owner. Values for the |
434 |
|
ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full |
435 |
|
and thus you should propably use an ownertrust value like "Marginal". |
436 |
|
But this is a personal decision and stored in a separate file and |
437 |
|
never exported with the public keys. For further information, please |
438 |
|
take a look into the GNU Privacy Handbook. |
439 |
|
Just a last work on Key Pairs, they are automatically marked as |
440 |
|
"Ultimate" because the key belongs to you and you trust it implicit. |
441 |
|
|
442 |
@bye |
@bye |