Blog
Tutorial For Implementing PGP In Linux OS
We are producing here the easiest possible way to implement PGP in Linux OS. Read on the whole guide to understand every step thoroughly.
>> Video Tutorial On How to Encrypt and Decrypt PGP Message In Linux <<
Table of Contents
The PGP Guide for Linux
We will be using CLI to put in these two pieces of software, and creating the keypair. The instance OS in question is Linux Mint, therefore the commands for install may differ from your current OS. Don’t fret though! That’s the sole part that will not be relevant to your OS, the remainder of the guide is going to be an equivalent across distros.
Step 1: Installing The Software
We are using GnuPG with Gnu Privacy Assistant. We prefer GPA as a graphical front-end because its layout is basically easy to know and follow.
- Open up Terminal.
- Type, without quotes, ‘sudo apt-get install gpa gnupg2’, then hit ‘enter’.
- Enter your password, hit ‘enter’.
- It’ll pull the dependencies needed for both to figure properly, tell you the space needed, and ask you to verify. Type ‘y’ then hit ‘enter’ to verify.
- Wait for touch as everything installs.This should only take a couple of minutes to finish.
See this picture to verify you’re doing the steps correctly:
Step 2: Make Your Keypair
Here are the subsequent step is to make your keypair. We’ll be using 4096 bit RSA to stay things extra secure!
- In your Terminal, type without quotes ‘gpg –gen-key’, then hit ‘enter’.
- It’ll ask you what quite key you would like. For our use case, we would like the option ‘1’.
- The next step is the vital length. The longer the length, the safer it’s. We’ll accompany 4096 bits.
4. It’ll now ask if you would like your key to expire after a particular amount of your time. This is often up to non-public preference, but we’ll choose ‘key doesn’t expire’, so just hit ‘enter’.
5. Confirm that yes, the key won’t expire. Type ‘y’, then hit ‘enter’.
6. Subsequent step is going to be to enter an ID to form it easier for people to spot your key. If you’ve made it this far, you ought to know what to do.
7. It’ll ask if this information is correct. If it is, type ‘O’ and hit ‘enter’.
8. Enter a passphrase to guard your secret key.
9. Here comes the most interesting part. It’s getting to generate your key and can ask you to try some random stuff to make entropy.
With that this process is complete, now we will be proceeding towards getting your public key.
Learn amazing darknet guides from Tutorials section of https://darkweblink.com/blog.
Step 3: Obtaining Your Public Key
Now what? Well if you would like to truly use it we’d like to get our public key. Everything from here is going to be done through the graphical front-end.
- Open Terminal, type ‘sudo gpa’, hit ‘enter’. Type in your password.
- You’ll be greeted by a gorgeous window
3. Click on the keypair you only created, click ‘Keys’ up at the highest, then ‘Export keys…’
4. Select where you would like it saved, enter a filename, and click on ‘Save’.
5. Browse to the situation in your file manager, open up that file with a text editor, with this step has been completed.
Step 4: Getting Your Private Key
If you ever want to modify operating systems or PGP programs, you can easily do that. It’s even as easy as obtaining your public key. Confirm you retain this file safe!
- Hopefully, you continue to have GPA open. If not, follow step #1 of Part 3.
- Click on your keypair, click ‘Keys’ up at the highest then ‘Backup’.
3. Select where you would like it saved, keep the filename it gives you, and click on ‘Save’.
4. A window will pop up and ensure that you have your private key now.
Step 5: Importing a Public Key
So you would like to shop on the darknet, you’ll have to encrypt your message unless you would like LE kicking down your door and putting a boot to your throat.
- Obtain the recipient’s public key, which may hopefully be found on their profile.
- Copy everything, paste into a text editor, store it somewhere safe.
- Up at the highest, click ‘Keys’, then ‘Import key…’
4. Select the key, then click ‘Open’. You’ll see this window.
5. We’re done!
Step 6: Importing a Personal Key
You finally realized that Microsoft/Apple is spying on you, and need to modify to an OS that respects your right to privacy. How does one bring your key over?
- Up at the highest, select ‘Keys’, then ‘Import Keys…’