[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

'Hit Us, Please' - America's Left Issues A 'Broken Arrow' Signal To Europe

Cash Jordan Trump Deports ‘Thousands of Migrants’ to Africa… on Purpose

Gunman Ambushes Border Patrol Agents In Texas Amid Anti-ICE Rhetoric From Democrats

Texas Flood

Why America Built A Forest From Canada To Texas

Tucker Carlson Interviews President of Iran Mosoud Pezeshkian

PROOF Netanyahu Wants US To Fight His Wars

RAPID CRUSTAL MOVEMENT DETECTED- Are the Unusual Earthquakes TRIGGER for MORE (in Japan and Italy) ?

Google Bets Big On Nuclear Fusion

Iran sets a world record by deporting 300,000 illegal refugees in 14 days

Brazilian Women Soccer Players (in Bikinis) Incredible Skills

Watch: Mexico City Protest Against American Ex-Pat 'Invasion' Turns Viole

Kazakhstan Just BETRAYED Russia - Takes gunpowder out of Putin’s Hands

Why CNN & Fareed Zakaria are Wrong About Iran and Trump

Something Is Going Deeply WRONG In Russia

329 Rivers in China Exceed Flood Warnings, With 75,000 Dams in Critical Condition

Command Of Russian Army 'Undermined' After 16 Of Putin's Generals Killed At War, UK Says

Rickards: Superintelligence Will Never Arrive

Which Countries Invest In The US The Most?

The History of Barbecue

‘Pathetic’: Joe Biden tells another ‘tall tale’ during rare public appearance

Lawsuit Reveals CDC Has ZERO Evidence Proving Vaccines Don't Cause Autism

Trumps DOJ Reportedly Quietly Looking Into Criminal Charges Against Election Officials

Volcanic Risk and Phreatic (Groundwater) eruptions at Campi Flegrei in Italy

Russia Upgrades AGS-17 Automatic Grenade Launcher!

They told us the chickenpox vaccine was no big deal—just a routine jab to “protect” kids from a mild childhood illness

Pentagon creates new military border zone in Arizona

For over 200 years neurological damage from vaccines has been noted and documented

The killing of cardiologist in Gaza must be Indonesia's wake-up call

Marandi: Israel Prepares Proxies for Next War with Iran?


Activism
See other Activism Articles

Title: Introduction to PGP
Source: http://www.queen.clara.net/pgp/pgp.html
URL Source: http://www.queen.clara.net/pgp/pgp.html
Published: May 16, 2006
Author: ??
Post Date: 2006-05-16 12:27:03 by Neil McIver
Keywords: PGP
Views: 414
Comments: 9

Introduction to PGP

Introduction to PGP

Contents

Beginner's section

What is PGP?

I have set up this page in response to questions I get about PGP - what it is, where to get it, and how to use it.

PGP (short for Pretty Good Privacy), created by Philip Zimmermann, is the de facto standard program for secure e-mail and file encryption on the Internet. Its public-key cryptography system enables people who have never met to secure transmitted messages against unauthorized reading and to add digital signatures to messages to guarantee their authenticity.

Why do we need PGP? E-mail sent over the Internet is more like paper mail on a postcard than mail in a sealed envelope. It can easily be read, or even altered, by anyone with privileged access to any of the computers along the route followed by the mail. Hackers can read and/or forge e-mail. Government agencies eavesdrop on private communications.

For further discussion of what PGP is for, and what it can do, read the following articles:

In a full

transcript of an interview on the radio show High Tech Today Phil Zimmermann himself explains why he wrote PGP.

More detailed information about PGP, and copies of the program itself for various platforms, can be found from the links given below.

Basic tutorials for beginners

There is considerable overlap between these tutorials. If you don't find the information you need in one of them, try another, or try the FAQ. Some of these sites are out of date, referring only to older versions of PGP, but they still provide generally useful information.


Downloading PGP

The proliferation of different PGP versions can be rather confusing. The following links provide an explanation of the various versions and what they can do:

Versions of the program for MS-DOS can be downloaded directly from here:

The first two versions do the same thing, though the international version has certain minor advantages. Two different versions existed for legal reasons.

PGP 2.6.3ia for RISC OS. Here you can find a collection of PGP software and other security utilities for RISC OS (Acorn) computers. There is also a RISC OS version of GnuPG, which is compatible with (and even superior to) modern versions of PGP.

PGP versions 5 to 8 are available for Windows 95/98/NT, MacOS, Unix, Linux, OS/2 and Amiga, but not every version is available for every platform. Whichever operating system you use, you can find an appropriate version on one of the following sites:

PGP 9 for Windows 2000/XP and Mac OS X is available from

PGP Corporation.


Some PGP-related links

Although some of the following links are not up to date and lack information about the latest versions of PGP, they all provide useful general information.


The UKERNA Secure E-Mail Project

The United Kingdom Education and Research Networking Association (UKERNA) runs the Joint Academic Network (JANET) on behalf of the Academic Community of the U.K. (approximately ac.uk). UKERNA sees the current solution to authentication and privacy of documents to be PGP and is investigating how PGP can be made easy to use for sending e-mail.


How PGP works (in part)

If you are mathematically inclined and understand (or are willing to learn) a little about modular arithmetic, you can read about the maths behind some public-key cryptosystems at the following URLs:

(2 images)

Subscribe to *PGP Privacy Info*

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 2.

#2. To: Neil McIver (#0)

Question: If someone makes a privacy program that prevents the gubmint from reading emails, does that program somehow become illegal or could the author be construed a "terrorist"?

mehitable  posted on  2006-05-16   14:13:55 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 2.

#3. To: mehitable (#2)

I think your question will carry much more significance if/when someone creates an public key encryption system for VoIP phones, rendering government wiretapping worthless.

Neil McIver  posted on  2006-05-17 00:24:25 ET  Reply   Untrace   Trace   Private Reply  


End Trace Mode for Comment # 2.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]