gpg   6355

« earlier    

Stick with security: YubiKey, SSH, GnuPG, macOS — Martian Chronicles, Evil Martians’ team blog
See how to go beyond standard U2F functionality of your YubiKey and authenticate via SSH from a Mac with a PGP key on a USB stick.
ssh  security  gpg  yubikey  mac  pgp  mfa  guide  infosec  privacy 
5 days ago by emory
GPG Tutorial | DevDungeon
gpg --export-secret-keys --armor XXXXXXXX > ./my-priv-gpg-key.asc
12 days ago by rpavlov
How to rotate your OpenPGP / GnuPG keys - GeekWare
Tutorial on how to generate a new PGP / GPG key pair and properly rotate from your old one.
gpg  gnupg  pgp  key  management  privacy  security  email  infosec  bestpractices 
18 days ago by emory
GPG and yubikey - Serenity through madness
A year or so ago I got myself a yubikey. So far I had only beenusing it to improve the process of logging in to most of my 2FA-protected accounts and I loved...
guide  gnupg  security  infosec  gpg  pgp  subkeys  yubikey 
18 days ago by emory
Use GPG to encrypt files on IU's research supercomputers
GNU Privacy Guard (GPG, also GnuPG) is free encryption software that's compliant with the OpenPGP (RFC4880) standard. Using GPG you can encrypt (and decrypt) files that contain sensitive data, such as protected health information (PHI) regulated by the Health Insurance Portability and Accountability Act (HIPAA) privacy and security rules. For more on GPG, see GNU Privacy Guard .

At Indiana University, GPG is installed as a command-line application in the default user environments on IU's research supercomputers. To use GPG, you create a unique encryption key, and then use that key to encrypt and decrypt your files. If you need help, contact the UITS Research Applications and Deep Learning team .
gpg  gnupg  encryption  crypto  privacy  security  infosec  files  iu 
18 days ago by emory
The server is a public service for the distribution and discovery of OpenPGP-compatible keys, commonly referred to as a "keyserver".

For instructions, see our usage guide.

How it works

An OpenPGP key contains two types of information:

Identity information describes the parts of a key that identify its owner, also known as "User IDs". A User ID typically includes a name and an email address.
Non-identity information is all the technical information about the key itself. This includes the large numbers used for verifying signatures and encrypting messages. It also includes metadata like date of creation, some expiration dates, and revocation status.
Traditionally, these pieces of information have always been distributed together. On, they are treated differently. While anyone can upload all parts of any OpenPGP key to, our keyserver will only retain and publish certain parts under certain conditions:

Any non-identity information will be stored and freely redistributed, if it passes a cryptographic integrity check. Anyone can download these parts at any time as they contain only technical data that can't be used to directly identify a person. Good OpenPGP software can use to keep this information up to date for any key that it knows about. This helps OpenPGP users maintain secure and reliable communication.

The identity information in an OpenPGP key is only distributed with consent. It contains personal data, and is not strictly necessary for a key to be used for encryption or signature verification. Once the owner gives consent by verifying their email address, the key can be found via search by address.

Community and platform

This service is run as a community effort. You can talk to us in #hagrid on Freenode IRC, also reachable as on Matrix. Of course you can also reach us via email, at support at keys dot openpgp dot org. The folks who are running this come from various projects in the OpenPGP ecosystem, including Sequoia-PGP, OpenKeychain, and Enigmail.

Technically, runs on the Hagrid keyserver software, which is based on Sequoia-PGP. We are running on, a hosting platform focused on Internet Freedom projects, which is managed by Greenhost.
email  security  encryption  gpg  pgp  gnupg  keyserver  directory  services  pki 
19 days ago by emory

« earlier    

related tags

2010s  2018  2fa  5*  a  age  algorithm  alternative  app  article  asc  auth  authentication  bestpractices  biblio  btc  camelot  centos  centos6  centos7  chat  cheatsheet  check  chosen  clef  cli  collision  collisions  communication  cracking  criticism  crypt  crypto  cryptography  cryptomail  decrypt  directory  dns  download  dsa  elgamal  emacs  email  encrypt  encrypted  encryption  error  etc  eth  exchanging  explained  exploits  fedora  fido  files  filesharing  fix  fpr  fsf  git  github  gns  gnu  gnunet  gnupg  gopass  government  gpgkey  gpl  grimmeathook  guide  guix  hacking  hardware  hash.collision  hash  hashes  hashing  how  howto  hsm  identity  important  in  infosec  infra  ioctl  iot  iu  key  keybase  keys  keyserver  ledger  legal  linux  lol.buttcoin  mac  mail  management  manager  maybesolution  mc  mfa  mojonation  netrc  network  nio  nitro  nitrokey  openpgp  opensource  openssh  opinion  or  osx  packagemanagement  pass  password  passwords  pentesting  pgp  pgpkey  pii  pikepdf  pki  pop  prefix  privacy  pubkey  public  pypdf  redhat  redteam  reference  remove  repository  research  revoke  rpc  rpm  rsa  sec  secrets  secure-messaging  security  services  setup  sha-1  sha  sha1  sha256  sig  sign  signal  signature  signing  software  solution  spacemacs  ssh  ssl  stackexchange  subkey  subkeys  symmetric  sync  sysadmin  tabula  tails  tar  thirdpartyrepo  threads  tls  to  tool  tools  trust  type:tutorial  u2f  ubuntu  unix  us  usb  vendors  verify  verschlüsselung  vim  wa_state  windows  with  workflows  wormhole  x509  yubikey  yum 

Copy this bookmark: