I saw that people on the dark web would sign their posts with a PGP key to prove that their account has not been compromised. I think I understand the concept of how private and public keys work but I must be missing something because I don’t see how it proves anything.

I created a key and ran gpg --export --armor fizz@… and I ran that twice and both blocks were identical. If I posted my public key block couldn’t someone copy and paste that under their message and claim to be me?

You are viewing a single thread.
View all comments View context
0 points

How is Crul wrong in anything other than the terminology? You sign a document with your private key - generating basically a hash of the document entangled with your key information. Anyone holding the public key can then verify that hash with the public key - that the document contents are intact and unchanged (from the hash), and generated by the person holding the private key (entangled key information)

permalink
report
parent
reply

Ask Science

!askscience@lemmy.world

Create post

Ask a science question, get a science answer.


Community Rules

Rule 1: Be respectful and inclusive.

Treat others with respect, and maintain a positive atmosphere.


Rule 2: No harassment, hate speech, bigotry, or trolling.

Avoid any form of harassment, hate speech, bigotry, or offensive behavior.


Rule 3: Engage in constructive discussions.

Contribute to meaningful and constructive discussions that enhance scientific understanding.


Rule 4: No AI-generated answers.

Strictly prohibit the use of AI-generated answers. Providing answers generated by AI systems is not allowed and may result in a ban.


Rule 5: Follow guidelines and moderators' instructions.

Adhere to community guidelines and comply with instructions given by moderators.


Rule 6: Use appropriate language and tone.

Communicate using suitable language and maintain a professional and respectful tone.


Rule 7: Report violations.

Report any violations of the community rules to the moderators for appropriate action.


Rule 8: Foster a continuous learning environment.

Encourage a continuous learning environment where members can share knowledge and engage in scientific discussions.


Rule 9: Source required for answers.

Provide credible sources for answers. Failure to include a source may result in the removal of the answer to ensure information reliability.


By adhering to these rules, we create a welcoming and informative environment where science-related questions receive accurate and credible answers. Thank you for your cooperation in making the Ask Science community a valuable resource for scientific knowledge.

We retain the discretion to modify the rules as we deem necessary.


Community stats

  • 1.2K

    Monthly active users

  • 105

    Posts

  • 720

    Comments