Privacy:PGP

From Technologia Incognita
Revision as of 21:31, 19 September 2013 by Phicoh (talk | contribs)
Jump to: navigation, search

Start using PGP

Why do you need PGP? - by Phil Zimmerman (dutch version)

PGP section in cryptoparty handbook - Chapter 6 Email Encryption

Clients

  • Thunderbird with enigmail - graphical use interface, easy to use
  • GPG command line client - easy to use if you prefer commandline stuff
  • Kleopatra - slowwwww, deinstalled it
  • ...

Level of safety

  • The encrypted message/file is considered safe
    • if your private key isn't compromised (duh)
    • and given that your key is strong enough
  • PGP is not anonymous
    • Sender and receiver IDs are known. Including names if the keys are uploaded to key servers
  • Signing keys of your friends
    • Pro: build a web of trust
    • Con: everyone can see your network

Experiences

  • phicoh
    • gpg1.4 and nmh. Nmh is a command line mail clinet. Some script integrating nmh and gpg can be found at http://faculty.cs.niu.edu/~rickert/mh/
      • it lacks the possibility to reply on a pgp encrypted mail