http://ssd.iykpqm7jiradoeezzkhj7c4b33g4hbgfwelht2evxxeicbpjy44c7ead.onion/my/module/%E1%80%85%E1%80%80%E1%80%AC%E1%80%B8%E1%80%9D%E1%80%BE%E1%80%80%E1%80%BA%E1%80%9E%E1%80%B1%E1%80%AC%E1%80%B7-%E1%80%85%E1%80%85%E1%80%BA%E1%80%86%E1%80%B1%E1%80%B8%E1%80%A1%E1%80%90%E1%80%8A%E1%80%BA%E1%80%95%E1%80%BC%E1%80%AF%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8
Thanks to the web of trust, PGP also lets you download keys for new contacts from the PGP keyservers. Your software can upload your key, tied to your email address to a keyserver. Then any PGP users can ask the keyservers for the right key for a particular email address. There’s nothing stopping bad actors from uploading wrong keys for an email address or identity to the keyservers—indeed, this has happened in the past—but if a key is signed as valid by a lot of people you know, it is more...