Page 1 of 1

GNU Privacy Guard – The Basics

Posted: Fri Nov 08, 2013 5:46 pm
by bubbl
According to Edward Snowden in his QA session on the Guardian, much of the existing encryption is weak, so the NSA can frequently find ways round it, but there are strong crypto systems that can still be relied on. This means most of the available digital, wireless, wired encryption tools are, to be honest, useless. What is even more fearsome, we are no longer hidden in the depths of our own homes, and even if one doesn’t have access to the Internet, it doesn’t mean they’re being watched. Almost every electronic equipment you use, leaves behind metadata – information generated as you use technology. Examples include the date and time you called somebody or the location from which you last accessed your email. However, if you believe what Snowden says, there are still some tools that help protect privacy and your physical location by providing anonymity as well as encrypting your data. The first one appears to be TOR network - a protective layer that sits between the user and the internet, providing anonymous path between you and the sites you visit. I’m not going to go into details about TOR, you can read about it on the official website. The second one - PGP (Pretty Good Privacy) - a popular program used to encrypt and decrypt e-mail over the Internet. It can also be used to send an encrypted digital signature that lets the receiver verify the sender’s identity and know that the message was not changed en route.

1. What is GPG?
2. How to use GPG?
3. Revocation-Certificate.
4. How to make your public key public?
5. The Keyring.
6. Key Signing and Trusted Keys.
7. Encryption and Decryption and Signing.
8. Further Reading.

More HERE http://www.bartbania.com/index.php/gnu- ... he-basics/