After a user generates his own GPG keypair, the very next step is to exchange the public key with others with whom the user wants to have encrypted communications. The user also needs to sign his own GPG keys as well as those of others. Now, what is the signing of...