Yeah, sorry, I meant signing, not encrypting. I know about asymmetrical encryption. That’s why I was confused by the original statement. For signing you use your private key so that others can verify your identity by using your public key for checking the signature. For encrypting data you use the public key of the receiver.
The original comment used the public key for signing, which is not what you want to do.
I now read the explanation.
Yeah, sorry, I meant signing, not encrypting. I know about asymmetrical encryption. That’s why I was confused by the original statement. For signing you use your private key so that others can verify your identity by using your public key for checking the signature. For encrypting data you use the public key of the receiver.
The original comment used the public key for signing, which is not what you want to do.I now read the explanation.