GPG Index As seen in a former article gpg can be used to encrypt and decrypt a message or file. Important to realise…you don’t need a password/passprase to encrypt. As soon as you posess the public key of the user you want to encrypt for, you can do just that. That leaves us with the …
GPG index Finaly …we can start using gpg to encrypt the very secret stuff we need to keep secret for the public eye. Bob has very secret information in a file which he wants to send to Alice. Since the wellbeing of the nation depends on this, he wants to make sure that only Alice …
GPG index Now I have a private/public key pair, but what to do with it? Ofcourse we want to use it for encrypting and signing files, we will get tot that in a minute (next article). Because, as written in the first article, Bob needs Alice’s public key to encrypt a message to her, and …
GPG index GPG operates with a pair of keys : a public key and a private (or secret) key. The public key can/will/must be distributed to your corespondents (or whatever you will call them). The private/secret key is kept to you and only you. If you would like to make a comparison with the “real” …
GPG (Gnu Privacy Guard) is the gnu implemantaion of PGP (Pretty Good Privacy). PGP was written decades ago by Phil Zimmermann, but it still does it job perfectly well. I will try to write down some notes about following subjects with respect to GPG Creating a public/private keypair Import and sign a public key Encrypt/Decrypt …