I’ve created a new PGP key pair… so if you’d like to send me encrypted mail, please use the following public key (download key):

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.20 (FreeBSD)
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==
=mcfJ
-----END PGP PUBLIC KEY BLOCK-----

Fingerprint and Key-ID (if you fetch them from a key server):

pub   4096R/1B7C29C4 2013-07-11
      Key fingerprint = 3FD7 A984 5A0F 6E07 0592  049E CB3B 23FB 1B7C 29C4
uid                  Farid Hajji <This email address is being protected from spambots. You need JavaScript enabled to view it.;
sub   4096R/2B163053 2013-07-11

Here’s a quick intro to PGP.

3 Comments

  1. You can download a free copy of the PGP encryption software from http://www.pgpi.org (available for most of the common computer operating systems, and also in various Open Source versions like GPG).

     
  2. There’s one more point though: if Bob managed to disseminate his public key as widely as possible (on websites, blogs, forums etc..), Alice could in theory check the public key she got directly (?) from Bob with the public key that Bob sent all over the Net. If they match, Alice can assume that Mallory didn’t modify Bob’s public key en route to her. Is that a safe assumption? Well, not really.

     
  3. If in doubt, Alice should trust the key she got directly from Bob, because everything she reads from the Net may be forged before it reaches her. Everything that Alice gets from the Net may be changed en passant by, say, an NSA bot that switches keys with keys it creates itself. Only the key she got from Bob directly (e.g. they exchanged keys via USB sticks during a personal meeting) is guaranteed to be unmodified. Everything else is to be taken cum grano salis.