Difference between revisions of "Privacy:PGP"
(→Level of safety) |
|||
Line 22: | Line 22: | ||
** Pro: build a web of trust | ** Pro: build a web of trust | ||
** Con: everyone can see your network | ** Con: everyone can see your network | ||
+ | |||
+ | === Experiences === | ||
+ | |||
+ | * phicoh | ||
+ | ** gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/ | ||
+ | *** it lacks the possibility to reply on a pgp encrypted mail | ||
[[Category:Privacy]] | [[Category:Privacy]] |
Revision as of 20:31, 19 September 2013
Start using PGP
Why do you need PGP? - by Phil Zimmerman (dutch version)
PGP section in cryptoparty handbook - Chapter 6 Email Encryption
Clients
- Thunderbird with enigmail - graphical use interface, easy to use
- GPG command line client - easy to use if you prefer commandline stuff
- Kleopatra - slowwwww, deinstalled it
- ...
Level of safety
- The encrypted message/file is considered safe
- if your private key isn't compromised (duh)
- and given that your key is strong enough
- PGP is not anonymous
- Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
- Signing keys of your friends
- Pro: build a web of trust
- Con: everyone can see your network
Experiences
- phicoh
- gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
- it lacks the possibility to reply on a pgp encrypted mail
- gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/