News

PGP Corp. sets out to do what Network Associates couldn't--entice enterprise customers to buy encryption products based on the PGP algorithm by making them easier to use.
This might be okay for data-at-rest, but once you migrate data from A to B, in many cases, we send the encryption keys with it. This is the equivalent of sending the keys to the castle with the castle ...
Each person using PGP has a private key, which they keep secret, and a public key, which they publish. A message encrypted with the public key can be decrypted by the private key, and vice versa.