[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

1200 Electric School Busses pulled from service due to fires.

Is the Deep State Covering Up Charlie Kirk’s Murder? The FBI’s Bizarre Inconsistencies Exposed

Local Governments Can Be Ignorant Pissers!!

Cash Jordan: Gangs PLUNDER LA Mall... as California’s “NO JAILS” Strategy IMPLODES

Margin Debt Tops Historic $1 Trillion, Your House Will Be Taken Blindly Warns Dohmen

Tucker Carlson LIVE: America After Charlie Kirk

Charlie Kirk allegedly recently refused $150 million from Israel to take more pro Israel stances

"NATO just declared War on Russia!"Co; Douglas Macgregor

If You're Trying To Lose Weight But Gaining Belly Fat, Watch Insulin

Arabica Coffee Prices Soar As Analyst Warns of "Weather Disasters" Risk Denting Global Production

Candace Owens: : I Know What Happened at the Hamptons (Ackman confronted Charlie Kirk)

Illegal Alien Drunk Driver Mows Down, Kills 16-Year-Old Girl Who Rejected His Lewd Advances

STOP Drinking These 5 Coffees – They’re Quietly DESTROYING Your Gut & Hormones

This Works Better Than Ozempic for Belly Fat

Cinnamon reduces fat

How long do health influencers live? Episode 1 of 3.

'Armed Queers' Marxist Revolutionaries Under Investigation For Possible Foreknowledge Of Kirk's Assassination Plot

Who Killed Charlie Kirk? the Case Against Israel

Sen. Grassley announces a whistleblower has exposed the FBI program “Arctic Frost” for targeting 92 Republican groups

Keto, Ivermectin, & Fenbendazole: New Cancer Treatment Protocol Gains Momentum

Bill Ackman 'Hammered' Charlie Kirk in August 'Intervention' for Platforming Israel Critics

"I've Never Experienced Crime Of This Magnitude Before": 20-Year Veteran Austrian Police Spox

The UK is F*CKED, and the people have had enough

No place for hate apeech

America and Israel both told Qatar to allow Hamas to stay in their country

Video | Robert Kennedy brings down the house.

Owner releases video of Trump banner ripping, shooting in WNC

Cash Jordan: Looters ‘Forcibly Evict’ Millionaires… as California’s “NO ARRESTS” Policy BACKFIRES

Dallas Motel Horror: Immigrant Machete Killer Caught

America has been infiltrated and occupied Netanyahu 1980


Activism
See other Activism Articles

Title: Introduction to PGP
Source: http://www.queen.clara.net/pgp/pgp.html
URL Source: http://www.queen.clara.net/pgp/pgp.html
Published: May 16, 2006
Author: ??
Post Date: 2006-05-16 12:27:03 by Neil McIver
Keywords: PGP
Views: 529
Comments: 9

Introduction to PGP

Introduction to PGP

Contents

Beginner's section

What is PGP?

I have set up this page in response to questions I get about PGP - what it is, where to get it, and how to use it.

PGP (short for Pretty Good Privacy), created by Philip Zimmermann, is the de facto standard program for secure e-mail and file encryption on the Internet. Its public-key cryptography system enables people who have never met to secure transmitted messages against unauthorized reading and to add digital signatures to messages to guarantee their authenticity.

Why do we need PGP? E-mail sent over the Internet is more like paper mail on a postcard than mail in a sealed envelope. It can easily be read, or even altered, by anyone with privileged access to any of the computers along the route followed by the mail. Hackers can read and/or forge e-mail. Government agencies eavesdrop on private communications.

For further discussion of what PGP is for, and what it can do, read the following articles:

In a full

transcript of an interview on the radio show High Tech Today Phil Zimmermann himself explains why he wrote PGP.

More detailed information about PGP, and copies of the program itself for various platforms, can be found from the links given below.

Basic tutorials for beginners

There is considerable overlap between these tutorials. If you don't find the information you need in one of them, try another, or try the FAQ. Some of these sites are out of date, referring only to older versions of PGP, but they still provide generally useful information.


Downloading PGP

The proliferation of different PGP versions can be rather confusing. The following links provide an explanation of the various versions and what they can do:

Versions of the program for MS-DOS can be downloaded directly from here:

The first two versions do the same thing, though the international version has certain minor advantages. Two different versions existed for legal reasons.

PGP 2.6.3ia for RISC OS. Here you can find a collection of PGP software and other security utilities for RISC OS (Acorn) computers. There is also a RISC OS version of GnuPG, which is compatible with (and even superior to) modern versions of PGP.

PGP versions 5 to 8 are available for Windows 95/98/NT, MacOS, Unix, Linux, OS/2 and Amiga, but not every version is available for every platform. Whichever operating system you use, you can find an appropriate version on one of the following sites:

PGP 9 for Windows 2000/XP and Mac OS X is available from

PGP Corporation.


Some PGP-related links

Although some of the following links are not up to date and lack information about the latest versions of PGP, they all provide useful general information.


The UKERNA Secure E-Mail Project

The United Kingdom Education and Research Networking Association (UKERNA) runs the Joint Academic Network (JANET) on behalf of the Academic Community of the U.K. (approximately ac.uk). UKERNA sees the current solution to authentication and privacy of documents to be PGP and is investigating how PGP can be made easy to use for sending e-mail.


How PGP works (in part)

If you are mathematically inclined and understand (or are willing to learn) a little about modular arithmetic, you can read about the maths behind some public-key cryptosystems at the following URLs:

(2 images)

Subscribe to *PGP Privacy Info*

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 2.

#2. To: Neil McIver (#0)

Question: If someone makes a privacy program that prevents the gubmint from reading emails, does that program somehow become illegal or could the author be construed a "terrorist"?

mehitable  posted on  2006-05-16   14:13:55 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 2.

#3. To: mehitable (#2)

I think your question will carry much more significance if/when someone creates an public key encryption system for VoIP phones, rendering government wiretapping worthless.

Neil McIver  posted on  2006-05-17 00:24:25 ET  Reply   Untrace   Trace   Private Reply  


End Trace Mode for Comment # 2.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]