[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]

/pgp/ - Pretty Good Privacy

Web of circlejerk

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types: jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1426289594958.jpg (40.49 KB, 284x398, 142:199, pgp_logo.jpg)

dd6fa4 No.50

What is PGP?

Encryption technology that's good enough for Edward fucking Snowden. In short, it's a way of ensuring that messages can only be read by the person they're intended for.

How does it work?

PGP encryption consists of two parts. A public key and a private key. The public key is meant to be shared, as somebody needs it if they want to send you a message only you can read. The private key never leaves your system.

Secure?

As hell.

Spies hate him! Use this one weird trick!

Where do I get it?

Macfags: http://gpgtools.org, or install gpg from homebrew/macports
Linuxfags: Install gpg (gpg, that is not a typo) from your favorite package manager.
Winfags http://gpg4win.org or http://www.gpg4usb.org


How do I use it?

We'll continue as if you're using the command line.

You need to make a key first. This is simple as:

gpg --gen-key


and answering some questions. You'll be asked for a name and email. You don't have to use real info here, but choose something you like because you can't change it later. The name will be used by everyone else when they want to write you a secure message.

A note: If you will be sharing messages on image boards (a great place, mind you), decide how long you want your key to be. A 4096 bit key might be super secure, but it also means you'll run into post limits on most boards. Choose carefully.

A key is a bunch of random data. Usually you'll see keys and messages as a bunch of noise - they're base64 encoded (or "ascii armored").

Now, you need to post your public key. If you do a:

gpg --export --armor (part of the name you chose earlier


you'll get a blob of text back that starts with "BEGIN PGP PUBLIC KEY BLOCK". Copy that and paste it here, including the begin and end bits. Remember that when you're sharing keys and messages, you always need to include the begin and end lines.

How do I encode/decode shit?

You need a public key for the person you wanna send a message to first. Once you've found their key, copy it, do:

gpg --import


..and paste it in.

Now you want to write them a message. Do:

gpg --encrypt --armor --recipient (name on their key)


Note: double check this part. If you have two people's keys with similar names, either enter a distinctive part of the name, or use their key ID instead.

Someone sent you a message? Copy it, run gpg --decrypt, paste it in.

Those are the basics!

0af9fa No.51

Good guide. Thank you.

dd6fa4 No.52

Back up your keys!

If you lose your private key, anything that was encrypted for it is permanently lost. There is no recovering a private key. I'm serious. It's gone.

For command line users (sorry winfags, you're on your own here), your entire keyring, public and private, as well as trust database, is stored in .gnupg in your home directory.

Tar this up and keep it someplace safe.

1c94a3 No.77

File: 1429104115935.png (98.58 KB, 1080x998, 540:499, Screenshot_2015-04-15-15-1….png)

APG (Encrypt email and files) Android Client - https://f-droid.org/app/org.thialfihar.android.apg



Delete Post [ ]
[]
[Return][Go to top][Catalog]
[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]