Difference between revisions of "Privacy:PGP"
m (removed topic already covered in crypto handbook) |
(added "level of safety", please edit if you are more experienced with this) |
||
Line 6: | Line 6: | ||
=== Clients === | === Clients === | ||
− | * Thunderbird with enigmail - graphical use interface, easy to use | + | * [https://www.mozilla.org/en-US/thunderbird Thunderbird] with [https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/ enigmail] - graphical use interface, easy to use |
− | * GPG command line client - easy to use if you prefer commandline stuff | + | * [http://gnupg.org/ GPG] command line client - easy to use if you prefer commandline stuff |
− | * Kleopatra - slowwwww, deinstalled it | + | * [http://www.kde.org/applications/utilities/kleopatra/ Kleopatra] - slowwwww, deinstalled it |
* ... | * ... | ||
− | |||
− | |||
− | === | + | === Level of safety === |
− | * | + | * The encrypted message/file is considered save |
+ | ** if your private key isn't compromised (duh) | ||
+ | ** and given that your key is strong enough | ||
− | + | * PGP is not anonymous | |
+ | ** Sender and receiver IDs are known. Including names if the keys are uploaded to key servers | ||
− | + | * Signing keys of your friends | |
+ | ** Pro: build a web of trust | ||
+ | ** Con: everyone can see your network | ||
[[Category:Privacy]] | [[Category:Privacy]] |
Revision as of 00:58, 8 September 2013
Start using PGP
Why do you need PGP? - by Phil Zimmerman (dutch version)
PGP section in cryptoparty handbook - Chapter 6 Email Encryption
Clients
- Thunderbird with enigmail - graphical use interface, easy to use
- GPG command line client - easy to use if you prefer commandline stuff
- Kleopatra - slowwwww, deinstalled it
- ...
Level of safety
- The encrypted message/file is considered save
- if your private key isn't compromised (duh)
- and given that your key is strong enough
- PGP is not anonymous
- Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
- Signing keys of your friends
- Pro: build a web of trust
- Con: everyone can see your network