This allows you to cryptographically sign ruby gems, so that a user can later verify that they've downloaded a copy that hasn't been tampered with or hacked.
On linux, gnupg 2.0 is usually installed as gpg2, and gpg points to gpg 1.4. Users should be able to somehow specify which gpg executable they want to use.
On linux, gnupg 2.0 is usually installed as gpg2, and gpg points to gpg 1.4. Users should be able to somehow specify which gpg executable they want to use.