When gpg encrypt is called from the command line, how is a key chosen to do the encryption?

I am using GnuPG. When gpg encrypt is called from the command line, how is a key chosen to do the encryption? It appears to me that -r, or –recipient, supplies a user id and that is the simple answer. I believe all of the ex… Continue reading When gpg encrypt is called from the command line, how is a key chosen to do the encryption?

What are spammers trying to acheive who only provide the correct contact information in their spam? [on hold]

I’ve recently received 2 spam SMS messages, claiming to be from 2 different organizations, but (obviously) not sent by them.

However, all of the contact details in the SMS match the real details of the organizations in quest… Continue reading What are spammers trying to acheive who only provide the correct contact information in their spam? [on hold]