From: Thérèse Godefroy
Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.
In addition to encryption and decryption, you can also use these keys to @@ -659,20 +659,12 @@ HTML. Instead, you can render the message body as plain text.
When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.
+it, then reply to you.It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.
-When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.
- -Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.
- @@ -711,9 +703,9 @@ be encrypted, signed, both, or neither.When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.
+When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.
It may take two or three minutes for Edward to
respond. In the meantime, you might want to skip ahead and check out the
+ When you receive Edward's email and open it, Enigmail will
+automatically detect that it is encrypted with your public key, and
+then it will use your private key to decrypt it. Notice the bar that Enigmail shows you above the message, with
+information about the status of Edward's key.
Your private key is more like a physical key, because you keep it to yourself (on your computer). You use GnuPG and your private key together to descramble encrypted emails other people send to you. You should never share you private key with anyone, under any +bold;">You should never share your private key with anyone, under any circumstances.
In addition to encryption and decryption, you can also use these keys to @@ -659,20 +659,12 @@ HTML. Instead, you can render the message body as plain text.
When Edward receives your email, he will use his private key to decrypt -it, then use your public key (which you sent him in Step -3.A) to encrypt his reply to you.
+it, then reply to you.It may take two or three minutes for Edward to respond. In the meantime, you might want to skip ahead and check out the Use it Well section of this guide.
-When you receive Edward's email and open it, Enigmail will automatically -detect that it is encrypted with your public key, and then it will use your -private key to decrypt it.
- -Notice the bar that Enigmail shows you above the message, with information -about the status of Edward's key.
- @@ -711,9 +703,9 @@ be encrypted, signed, both, or neither.When Edward receives your email, he will use your public key (which you -sent him in Step 3.A) to verify that your signature -is authentic and the message you sent has not been tampered with.
+When Edward receives your email, he will use your public key (which +you sent him in Step 3.A) to verify the message +you sent has not been tampered with and to encrypt his reply to you.
It may take two or three minutes for Edward to
respond. In the meantime, you might want to skip ahead and check out the
+ When you receive Edward's email and open it, Enigmail will
+automatically detect that it is encrypted with your public key, and
+then it will use your private key to decrypt it. Notice the bar that Enigmail shows you above the message, with
+information about the status of Edward's key.