Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent Changes
Live Chat
commons-linode-stage
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Pgp
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
PGP stands for 'pretty good privacy,' and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoever. What it does require, however, is your own keypair, an understanding of how public key encryption works, and the software to make it all run. Most PGP software will take care of key generation for you, so let me skip to instructions on usage. A keypair, as you might imagine, consists of two separate keys. The first is called the private key, and allows whoever possesses it to DECRYPT messages. The second is called the public key, and allows whoever possesses it to ENCRYPT messages. So, a person generates their very own keypair, and distributes their public key in whatever way they find appropriate (usually by putting it onto a keyserver such as pgp.mit.edu). This way, anybody can encrypt a message so that only the intended recipient is able to decrypt it. Now, Let's say that cypherpunk A wants to send a message to cypherpunk B, but he doesn't want it to get read by intelligence agent #1. If both A and B have encryption keys, they are in luck. All that A has to do is write her message (on a computer that hasn't already been hacked by the intelligence agent) and tell her encryption software to encrypt it using B's public key. This message can now be sent via the public network without fear of ISP/Telecom/Government scrutiny. Luckily PGP software can take care of this process as well, maintaining a list of recipients for whom public keys are known, and using them automatically when they are the recipient of a message. There are PGP plugins for virtually every popular mail application.
Summary:
Please note that all contributions to commons-linode-stage may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Commons-linode-stage:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width