You can sign any e-mail by attaching the public key. If you want to encrypt an e-mail, you need an e-mail from the recipient that he signed with his public key. The best way to store this public key is with the contact details of the sender of this e-mail. With this saved public key […]
As a private individual, you can purchase either a domain-validated SSL/TLS certificate to secure your domain or an identity-validated SSL/TLS certificate to confirm your identity. Please note that in order to purchase an identity-validated SSL/TLS certificate, you will need to provide a document confirming a completed face-to-face validation issued by a notary or attorney. If […]
Yes, in general the exchange of a code-signing-certificate is possible, but we advise you not to do so for the following reasons: The exchange is very complicated If you have not used a timestamp tool, all signed programs and so on are marked with an invalid signature after the exchange.