GNU Privacy Guard (GPG)

GNU Privacy Guard (GnuPG or GPG) is a free software alternative to the PGP suite of cryptographic software.
GnuPG encrypts messages using asymmetric keypairs individually generated by GnuPG users. The resulting public keys can be exchanged with other users in a variety of ways, such as Internet key servers. They must always be exchanged carefully to prevent identity spoofing by corrupting public key ↔ "owner" identity correspondences. It is also possible to add a cryptographic digital signature to a message, so the message integrity and sender can be verified, if a particular correspondence relied upon has not been corrupted.

How to start making GPG in linux  :
1. Install Kleopatra to manage your GPG sertificate
    apt-get install kleopatra
2. Install Libakonadi-contact4
   apt-get install libakonadi-contact4
3. After two tools are installed, the next step is regristasionto get the key, by the following steps :
   1. Generate a private key
       gpg --gen-key

     You’ll have to answer a bunch of questions:
  1. What kind and size of key you want; the defaults are probably good enough.
  2. How long the key should be valid. You can safely choose a non-expiring key for your own use. If you plan to use a key for public signing, you might want to consider a yearly expiration.
  3. Your real name and e-mail address; these are necessary for identifying your key in a larger set of keys.
  4. A comment for your key, perhaps to distinquish a key used for special tasks like signing software releases. The comment can be empty.
  5. A passphrase. Whatever you do, don’t forget it! Your key, and all your encrypted files, will be useless if you do.

    2. Generate an ASCII version of your public key
        gpg -k
   3. Send your public key to server to easier for people to get your public key
       gpg --send-keys
Finis !! now you can encrypt your emair or file, but to encrypt an email we need Thunderbied and enigmail
  apt-get install thunderbird
  apt-get install enigmail

Now protect your data using GPG .....

Comments

Popular posts from this blog

Grabbing Proxy With Selenium and Python

Authorization Testing

Bypass HTML Field Restrictions