Difference between revisions of "Privacy:PGP"

From Technologia Incognita
Jump to: navigation, search
m (removed topic already covered in crypto handbook)
(added "level of safety", please edit if you are more experienced with this)
Line 6: Line 6:
 
=== Clients ===
 
=== Clients ===
  
* Thunderbird with enigmail - graphical use interface, easy to use
+
* [https://www.mozilla.org/en-US/thunderbird Thunderbird] with [https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/ enigmail] - graphical use interface, easy to use
* GPG command line client - easy to use if you prefer commandline stuff
+
* [http://gnupg.org/ GPG] command line client - easy to use if you prefer commandline stuff
* Kleopatra - slowwwww, deinstalled it
+
* [http://www.kde.org/applications/utilities/kleopatra/ Kleopatra] - slowwwww, deinstalled it
 
* ...
 
* ...
=== Sign keys of your friends ===
 
* Pros and cons
 
  
=== Renew key ===
+
=== Level of safety ===
* How to renew key from the command line - http://www.g-loaded.eu/2010/11/01/change-expiration-date-gpg-key/
+
* The encrypted message/file is considered save
 +
** if your private key isn't compromised (duh)
 +
** and given that your key is strong enough
  
=== What if you lose your private key or your key gets compromised? ===
+
* PGP is not anonymous
 +
** Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  
=== I have created a key pair ages ago that can now be cracked easily. How to upgrade? ===
+
* Signing keys of your friends
 +
** Pro: build a web of trust
 +
** Con: everyone can see your network
  
 
[[Category:Privacy]]
 
[[Category:Privacy]]

Revision as of 01:58, 8 September 2013

Start using PGP

Why do you need PGP? - by Phil Zimmerman (dutch version)

PGP section in cryptoparty handbook - Chapter 6 Email Encryption

Clients

  • Thunderbird with enigmail - graphical use interface, easy to use
  • GPG command line client - easy to use if you prefer commandline stuff
  • Kleopatra - slowwwww, deinstalled it
  • ...

Level of safety

  • The encrypted message/file is considered save
    • if your private key isn't compromised (duh)
    • and given that your key is strong enough
  • PGP is not anonymous
    • Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  • Signing keys of your friends
    • Pro: build a web of trust
    • Con: everyone can see your network