On 01/25/2015 10:30 PM, Camille Testa wrote: > "I was not able to decrypt an encrypted message body you have sent > me. Maybe you encrypted the message with your own or someone else's > public key. In order for me to be able to decrypt your message, > it needs to be encrypted with my public key." > > Any ideas?
Have you taken the right key? Just checked it myself and for "[email protected]" I found three keys on the keyserver, all active. One from 2002, one from 2013 and one from 2014. This might be a good example of the trust system in GnuPG. Of course everybody can upload a key to a keyserver. So we have three public keys claiming to be the correct one. Which one really is? Or are all valid? Are you encrypting for adele really or for an intruder, who wants to read your secrets? Download all three keys from the keyserver and then in key management right click onto each and do "view signatures". This will show you a list of everybody who has signed this key (probably all will be "unknown", because non of your contacts signed adele). You might still be able to find out, that one seems more legitimate than the others :) (I have not tested if this is really the right one) As soon as you have a network of trusted IDs, this combines to the net-of-trust. If people you trust have trusted other people, you might believe them that they signed the true guy without being able to verifying yourself (e.g. because you cannot meet this guy in personal).
signature.asc
Description: OpenPGP digital signature
_______________________________________________ enigmail-users mailing list [email protected] To unsubscribe or make changes to your subscription click here: https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net
