This document discusses ensuring privacy in electronic communications through the use of public key cryptography. It begins with an introduction to public key cryptography and how it works using public and private key pairs. It then discusses how keyservers are used to store and share public keys and how signing keys can help verify identities. The document provides examples of encrypting and signing messages and stresses that signing is often mutual to help validate identities. Overall, the document presents public key cryptography as a solution for privacy by allowing for secure encrypted communication without needing to share passwords in advance.