this post was submitted on 29 Jul 2025
377 points (100.0% liked)
196
18146 readers
997 users here now
Be sure to follow the rule before you head out.
Rule: You must post before you leave.
Other rules
Behavior rules:
- No bigotry (transphobia, racism, etc…)
- No genocide denial
- No support for authoritarian behaviour (incl. Tankies)
- No namecalling
- Accounts from lemmygrad.ml, threads.net, or hexbear.net are held to higher standards
- Other things seen as cleary bad
Posting rules:
- No AI generated content (DALL-E etc…)
- No advertisements
- No gore / violence
- Mutual aid posts are not allowed
NSFW: NSFW content is permitted but it must be tagged and have content warnings. Anything that doesn't adhere to this will be removed. Content warnings should be added like: [penis], [explicit description of sex]. Non-sexualized breasts of any gender are not considered inappropriate and therefore do not need to be blurred/tagged.
If you have any questions, feel free to contact us on our matrix channel or email.
Other 196's:
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Could someone explain what this means in layman terms?
Public / Private key pairs are used for securely transmitting encrypted documents. The publication will generate a pair of linked keys, and publish one of them, the public key, while retaining the private key.
If you encrypt a document using the public key from the publication, your document can only be decrypted by the holder of the private key. So any whistleblower wanting to contribute can use that key to make sure no one other than the publication can read their submissions.
The same can be done in reverse. The publisher can use their private key to encrypt a document that only the public key can unlock. Though anyone can decrypt it because the key is public, this verifies the sender because it can only have been sent by the holder of the private key.
Usually they are published to a keyserver, actually printing the key is uncommon.
Thank you. This was a great explanation. How does one go about encrypting a message using a public key? Also should I use a burner email ID to send the encrypted message to guardian?
I've not actually done this in practice. There is software that does that. The thing that will get you caught leaking sensitive information is when you have revealed something somewhere. If this newspaper publishes sensitive information you have access to, someone will see that your lemmy account was specifically asking about sending to that specific publisher.
Most journalists know how to protect sources. Some don't. Make sure you vet whoever you are communicating with.