Eugene Chang
Eugene Chang
I am most interested in stats regarding underruns, overruns, and lost audio packets.
> 2. Generate a key for team and share it. Sharing a key is generally considered a bad idea. If one member is compromised, the key has to be revoked...
That is the idea. In this way, you always know: - who sent the email, - you can verify the email was not modified
Many years ago, checking the fingerprint was a tedious, manual process. Assuming you are using a mail reader that supports GPG (e.g. Outlook, Apple Mail), you would import the correspondent's...
I said it backwards. I don't know how may GPG plug-ins there are for mail readers.