On 01/25/2015 10:30 PM, Camille Testa wrote:
> "I was not able to decrypt an encrypted message body you have sent
> me. Maybe you encrypted the message with your own or someone else's
> public key. In order for me to be able to decrypt your message,
> it needs to be encrypted with my public key."
> 
> Any ideas?

Have you taken the right key? Just checked it myself and for
"[email protected]" I found three keys on the keyserver, all active. One
from 2002, one from 2013 and one from 2014.

This might be a good example of the trust system in GnuPG. Of course
everybody can upload a key to a keyserver. So we have three public keys
claiming to be the correct one. Which one really is? Or are all valid?
Are you encrypting for adele really or for an intruder, who wants to
read your secrets?

Download all three keys from the keyserver and then in key management
right click onto each and do "view signatures". This will show you a
list of everybody who has signed this key (probably all will be
"unknown", because non of your contacts signed adele).
You might still be able to find out, that one seems more legitimate than
the others :) (I have not tested if this is really the right one)


As soon as you have a network of trusted IDs, this combines to the
net-of-trust. If people you trust have trusted other people, you might
believe them that they signed the true guy without being able to
verifying yourself (e.g. because you cannot meet this guy in personal).

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
enigmail-users mailing list
[email protected]
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to