Next:    About this document 
Up:   E-Mail PrivacyAuthentication 
 Previous:   Anonymous Posting 
 
 
-   Note on multiple keys (including your own).
	If you, or someone else, has mulitiple keys, the best way to handle
	this is to set up aliases in your 
~/.premail/addresses that use
foo: bar ((key=0x[key_id])).  This is usefull to have one, light-weight
	key that you automagically decrypt and a bigger one for signing and
	other stuff.
    
 -   Key storage:
	Keep backups of your pgp keys, esp. private ones.  Really, I mean it.
	Send your key to the mit server.  You can do this through e-mail,
		by e-mailing to pgp-public-keys@pgp5.ai.mit.edu with subject
		ADD and your ascii-armored public key in the body, or by the
		web at pgp5.ai.mit.edu.
    
 -   Key retrieval: 
	As above, go to http://pgp5.ai.mit.edu (or to one of the mirrors listed
	there) and do an extract.  Can also be done via e-mail.  Read the docs
	there on the e-mail version.
    
 -   Adding keys:
	When you've retrieved a key, use pgp -ka 
<filename> to add the 
	file's
	key to your public key ring.  If you want to you read the pgp docs on 
	how the signature web-of-trust works, otherwise just assume that what
	comes from the server is OK.
 
 
Robin Lee Powell 
Wed Feb  4 20:10:44 EST 1998