Difference between revisions of "Privacy:PGP"

From Technologia Incognita
Jump to: navigation, search
(Level of safety)
Line 22: Line 22:
 
** Pro: build a web of trust
 
** Pro: build a web of trust
 
** Con: everyone can see your network
 
** Con: everyone can see your network
 +
 +
=== Experiences ===
 +
 +
* phicoh
 +
** gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
 +
*** it lacks the possibility to reply on a pgp encrypted mail
  
 
[[Category:Privacy]]
 
[[Category:Privacy]]

Revision as of 20:31, 19 September 2013

Start using PGP

Why do you need PGP? - by Phil Zimmerman (dutch version)

PGP section in cryptoparty handbook - Chapter 6 Email Encryption

Clients

  • Thunderbird with enigmail - graphical use interface, easy to use
  • GPG command line client - easy to use if you prefer commandline stuff
  • Kleopatra - slowwwww, deinstalled it
  • ...

Level of safety

  • The encrypted message/file is considered safe
    • if your private key isn't compromised (duh)
    • and given that your key is strong enough
  • PGP is not anonymous
    • Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  • Signing keys of your friends
    • Pro: build a web of trust
    • Con: everyone can see your network

Experiences

  • phicoh
    • gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
      • it lacks the possibility to reply on a pgp encrypted mail