Drowsy Don...Sad!
Thunderwolf
I don't have much experience in the realm of gpg. My experience is mostly with TLS. From what I know, if you're doing client authentication, you encrypt your message with your private key, and then the public key on a cert is used for validating that the message actually came from you.
I think code signing is similar to client auth, but not positive. Again, I use TLS, but I'm not a professional
Edit:
What I found from Wikipedia:
The client sends a CertificateVerify message, which is a signature over the previous handshake messages using the client's certificate's private key. This signature can be verified by using the client's certificate's public key. This lets the server know that the client has access to the private key of the certificate and thus owns the certificate.
https://en.m.wikipedia.org/wiki/Transport_Layer_Security#Client-authenticated_TLS_handshake
I think encrypting with a public key is mostly used in client -> server traffic (client encrypts with server's public key, server decrypts with private), and not code signing. However, I'm no TLS/asymmetric crypto savant.
Is it Clive?
At this rate, my next system might be a mac
"I have no mouth and I must Meme"
I ate the onion too 🤦😂
13th Amendment:
Neither slavery nor involuntary servitude, -except as a punishment for crime whereof the party shall have been duly convicted-, shall exist within the United States, or any place subject to their jurisdiction.
Basically says: "slavery is illegal unless it is used as a punishment for a crime".
California was voting to override the 13th Amendment it seems
STAR voting system
We learned it from you Dad
https://lemmy.world/c/the_pack