to get the public key. More often than not, the key will be provided as a small text file, which we
will call
key.asc
in the following examples.
To add the key to the trusted keyring, the administrator can run
apt-key add < key.asc
. An-
other way is to use the
synaptic
graphical interface: its Authentication tab in the Settings
→ Repositories menu provides the ability to import a key from the
key.asc
file.
For people who prefer a dedicated application and more details on the trusted keys, it is possible to
use
gui-apt-key
(in the package of the same name), a small graphical user interface that manages
the trusted keyring.
Once the appropriate keys are in the keyring, APT will check the signatures before any risky op-
eration, so that front-ends will display a warning if asked to install a package whose authenticity
can’t be ascertained.