summaryrefslogtreecommitdiff
path: root/pgp.txt
blob: be007d972fbac08c3500591c658eb84e1d48ebfb (plain)
  1. Trusted e-mail
  2. Attitude
  3. -----------
  4. Please insist to understand!
  5. PGP
  6. -----
  7. Pretty Good Privacy
  8. Used to sign (and encrypt) digital files, mostly used for emails.
  9. A digital fingerprint
  10. A key pair with a public and a private part
  11. You can have as many keys and indentities as you wish
  12. Form
  13. -------
  14. 1.
  15. A computer with you in full control
  16. Free software makes it possible to verify all code
  17. [DebianParl]
  18. Full disc encryption
  19. 2.
  20. E-mail address
  21. External email address
  22. 3.
  23. Mail list communication
  24. [List address]
  25. Create your identity
  26. --------------------------
  27. 1. Use a working email account
  28. 2. Think of a good passphrase
  29. 3. Use a PGP tool (we use an email plugin)
  30. 4. Create a new key pair (with default settings)
  31. 5. Keep your private key secret and share your public key with the World
  32. Support someone's identity
  33. ------------------------------------
  34. 1. Get her public key
  35. From a key server or on a usb-stick
  36. Name, email address, public key (last 8-16 digits)
  37. 2. Verify that the fingerprint of her public key matches the fingerprint of the key you have received
  38. 3. Sign her public key (with your private key)
  39. 4. Pass your signature to her
  40. Send an email or use a PGP server or a USB stick
  41. Use
  42. -----
  43. Your email application handles the signing of your emails
  44. When you send a signed email, write your passphrase
  45. When you receive a signed email, write your passphrase
  46. You can sign other files as well. You can also use your PGP-key for encryption, but that is not the aim of this project*.
  47. Invalidation
  48. ---------------
  49. If your signature has been compromised
  50. Ask your keyhandlingapplication to invalidate your key