I’m going to start going over some Core Concepts, a lot of these I ask in interview questions. “What is PKI? How do you Encrypt, Decrypt, Sign and Verify Data?” The Answers I get are quite wrong or not quite right most of the time. PKI, Public Key Infrastructure Covered, read the wiki link, TLDR: it’s our ssl chaining system Continue reading What the heck is PKI, Public Keys, Private Keys, Infrastructure, Security, Sign this Encrypt that..what?!
So while at InteropITX, the use case was given that your employees should expect a consistent signature from co-workers to ensure phishing hasn’t been used to gather information from internal staff to coordinate an attack. HOWEVER, “Thanks, -Jake” is no cryptographically sane signature, and it’s not HARD to sign emails with your private key, —–BEGIN PGP SIGNED MESSAGE—– Hash: SHA512 Continue reading What is a real email signature.