- Why I Wrote PGP -Part of the Original 1991 PGP User’s Guide
It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having a secret romance. Or you may be communicating with a political dissident in a repressive country. Whatever it is, you don’t want your private electronic mail (email) or confidential documents read by anyone else. There’s nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution.
- Crypto Wars, Phil Zimmermann and PGP
Phil Zimmermann was a key player in this period. The PGP software he authored was considered as munitions by the US government and subject to export licenses. The US government at this time was keen to avoid strong crypto falling into the hands of civilians and foreign governments. At this time the US government was also pushing for specialised key-escrowed chips that would perform encryption, but make the plaintext readable to NSA if necessary. This was rightly considered a gross violation of privacy, rights, and a huge security hole by the cypherpunks.
- Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state
Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective is more relevant than ever.
- Even the Inventor of PGP Doesn’t Use PGP
PGP for Newbs and Beyond
With this interactiv instruction we want to explain you, how to encrypt your e-mails with PGP to protect your communication and help stopping mass surveillance.
- EMAIL SELF-DEFENSE - “Learn GnuPG in 30 Minutes”
- How To Use GPG to Encrypt and Sign Messages
- Quick’n easy gpg cheatsheet
- GPG Quickstart Guide 🔒
- GPG Tutorial and PGP Public Key for ∀lan ∃liasen
- GnuPG for Daily Use (a Mini How-To…)
- Configuring Yubikeys, GPG, and Keybase
- Solving the PGP Revocation Problem with OpenTimestamps for Git Commits
Another form of public key encryption, allows you to remotely connect to a server, without typing in your user\name password.
- Connecting to GitHub with SSH
- Generating a new SSH key and adding it to the SSH agent
- Adding a new SSH key to your GitHub Account
- How to manage multiple GitHub accounts on a single machine with SSH keys
Has built in support for PGP for your e-mails… but doesn’t make it super easy to verify messages from outside.
Somehow you can use PGP with non-protonmail users.. but I haven’t figured it out, yet.
It’s really super to use Protonmail and I’ll recommend it to anyone.
Verifying PGP Signatures
- HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC
- VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES
gpg --import singing_key.pub gpg --verify signed_file.sig
Bitcoin and Ethereum Signatures
- How do digital signatures in Bitcoin work?
- Signing a message from your Ethereum wallet with MyEtherWallet
Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it’s open source and powered by public-key cryptography.
Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can’t leak your files or be hacked.
- Keybase - PGP Encryption made Easy
We established DeepDotWeb in the wake of our friend being arrested by local authorities, for buying drugs from the original Silk Road marketplace. Our aim is make information about dark net markets accessible to everyone, as well as making the dark net safer by reporting on security risks, scams and operations conducted by law enforcement.
- Jolly Roger’s Security Guide for Beginners
- PGP Tutorial For Newbs (GPA - Gpg4Win)
- PGP Tutorial For Newbs (Kleopatra - Gpg4Win)
- PGP Tutorial For Newbs Gpg4usb
- Basic Guide to PGP On Linux
- PGP Tutorial for OSX
Escrow Agents are impartial and trusted intermediaries who hold custody of buyer’s funds until pre-defined conditions are met. They allow parties who don’t know or trust each-other to engage in commerce, online.
Using multi-signature ensures that the trust agent never has full control over the funds and cannot take them to himself. In addition, when everything goes well, the funds can be released with no intervention by the trust agent.
Launched in 2013, Bitrated was the first multi-signature application ever released to the public. Bitrated is operated from Israel and was founded by Nadav Ivgi, a software developer and a long time Bitcoin enthusiast.
Traffic on the Jobs4Bitcoins subreddit is picking up, and with it, the number of transactions with anonymous strangers around the internet. One thing that is sorely needed is a simple, trusted escrow system through which to have secure trades of work for bitcoin.
Commissioned by the admin of the subreddit, /u/matthew_boyd, this app attempts to fill that hole, by providing the service of trusted escrow for a small fee.
When some work is uploaded, a community-trusted programmer will check through it, to make sure that the project has been successfully completed.
Yes you can even “unofficially” get encypted chat for discord
These seem to be the currently active bitcointalk threads.
- Financisto: ⛓LIST⛓ BitcoinTalk’s Escrow Providers: Ranking & Blacklist ☠ Avoid Scammers ☠ - (Started `13 — Updated 9/18)
- hedgy73: Recommended bitcointalk escrow services - (Started 11/17 — Updated 7/18)
- Escrow for anything via discord by Dream (fpga channel mod) March 03, 2019
- Steven-Ireland/ethmail.tech - PGP\Ethereum Powered Distributed E-mail
- mailbox_with_mail YAM (short for ‘Yet Another Mailer’)
- nurupo/paper-store - Cold store small files on paper as QR codes – PGP keys, Bitcoin keys, Tox keys or any other small files in general.
- mozilla/sops - Secrets management stinks, use some sops!
- Common Encryption Types, Protocols and Algorithms Explained
- Documentation and Examples
- EMAIL SELF-DEFENSE - “Learn GnuPG in 30 Minutes”
In addition to using encryption, standing up to surveillance requires fighting politically for a reduction in the amount of data collected on us, but the essential first step is to protect yourself and make surveillance of your communication as difficult as possible. This guide helps you do that. It is designed for beginners, but if you already know the basics of GnuPG or are an experienced free software user, you’ll enjoy the advanced tips and the guide to teaching your friends.
Social ShareTwitter Facebook LinkedIn Reddit