🕒 15 - 20 minutes
In today's world, you do not have to be an undercover agent working at a special government organization to use encryption tools. There is so much information being shared constantly, and almost any company out there is waiting eagerly to get their hands into the sweet stuff, that is your data here. This is something that you use on a daily basis, even if you do not realize it. Most of the time, your internet service provider, your email server host, that shady forum page you used to visit a decade ago or even your bank is encrypting same piece of valuable information that you have, so that in case it falls into wrong hands, no real harm can be made.
Don't get me wrong, this isn't necessarily a bad thing, but you ultimately rely on these big services to keep your information safe. Sometimes you don't have any other way, or sometimes you just do not know any better. It's fine, everybody starts somewhere. It becomes progressively easier as you dive deeper into it.
Fundamentals
It is possible to use simpler encryption systems to have a secret way of communicating with your friends, sometimes it's a cool little side activity. Considering the sheer size of the internet today however, that will not get you anywhere. There is probably some tool out there, that supports the messaging format of your choice. The majority of them uses what is called an antisymmetric encryption.
Basically, you as the receiver of a message, make your public key available for anyone. Perhaps you could put it on your website, just like how I did it. The person that is going to send this message will use this public key to encrypt the message and send it to you. There is one little problem though. Let's say somebody sent you a message using your public key, claiming that they are me. Well... it is publicly available after all, who is stopping anyone from doing that? Many programs uses some sort of a fingerprinting mechanism to overcome this issue. For instance, here is the fingerprint tied to my public key.
The idea is simple. Anybody can send you messages using your public key, but once you decrypt that message, you would see a different fingerprint than what is shown above. Basically, before sending a message to someone you also put a little star on it using your private key. This is mostly called signing, just like how it is in real life. This ensures that the message is actually coming from the right person. As long as, you are sure that this value actually belong to the person you wish to talk to, you are all good.
For instance, if you legitimately received an e-mail from me, and you are using an e-mail client that supports user encryption (which we will talk about soon), this is more or less what you would see.
Majority of the tools available to an end user will use some combination these techniques, with slightly different algorithms on their back, AES, RSA, RFC, ECC (Elliptic Curve Cryptography) to name a couple.
Whatever message you wish to send, it can probably handled with a couple paragraphs of plaintext e-mail. First of all, e-mails by default is not really a secure way of communication. The reason for that is, even if you take the necessary security measures to protect that message along the way, you should be interacting with a third party server that you have no control of. Encrypting your e-mail assures that even your e-mail service provider can not spy on your messages.
The popular software that makes this available to the end user is PGP, which stands for Pretty Good Privacy. It has been around since 90's. What you will probably using is the modern implementation of it called OpenPGP, which you may check out here. It has support for any operating system out there. Here is a list of programs to make it easier for you.
I would also recommend using an e-mail client that is designed for these features in mind. You can add these functionality to something like Windows Mail or AppleMail, but it will always be an hassle and it will probably not be a smooth experience. OpenPGP site has some nice software recommendations.
Keep in mind that HTML emails don't really play nice with encryption. If you have no idea what that is, HTML is a markup language mainly designed for rendering text on the internet. The page that you are currently reading is HTML. They are mainly used for sending spam, and marketing emails. There is no need to use a complex tool just to send a paragraph of text to your buddy, trust me on this one. Plaintext/txt is just fine. You are highly encouraged to check this site, to learn more.
In order to be able to do what we mentioned so far, you need a key. There isn't only one way to obtain this, you could use a graphical program, or a command line utility, whichever you prefer. Here, I will be demonstrating it using GnuPG, shortly gpg. The information provided here is a bare-minimum, for more information you may look at the manual for gpg.
You should have in your mind what is called a master password. This lets you use your key when you want to encrypt, decrypt or sign things. Choose something that is strong, that is easy to remember for you. To get an idea, this video can be helpful. You could also generate an even stronger password, with a password manager. These are not directly related to our topic at hand, but it is in general a good practice. Now, we are ready for some action.
$ gpg --full-gen-key gpg (GnuPG) 2.2.27; Copyright (C) 2021 Free Software Foundation, Inc. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Please select what kind of key you want: (1) RSA and RSA (default) (2) DSA and Elgamal (3) DSA (sign only) (4) RSA (sign only) (14) Existing key from card Your selection? 1
The command shown above walks you through the process of creating a key. It will ask you for a keysize, which is represented in bits. Then, it will ask you for some kind of ID that you want to use, and your email address. Keep in mind that this is a local operation, you are not actually signing up to anything. You are simply creating a key on your own device, and it is completely under your control.
RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (3072) 4096 Requested keysize is 4096 bits Please specify how long the key should be valid. 0 = key does not expire= key expires in n days w = key expires in n weeks m = key expires in n months y = key expires in n years Key is valid for? (0) 0 Key does not expire at all Is this correct? (y/N) y GnuPG needs to construct a user ID to identify your key. Real name: ExampleNickname Email address: example@example.com Comment: This is an example! You selected this USER-ID: "ExampleNickname (This is an example!) <example@example.com>"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. gpg: key 06F14AD19725323C marked as ultimately trusted gpg: revocation certificate stored as '28251FE8EB0C84968EAC18F306F14AD19725323C.rev' public and secret key created and signed. pub rsa4096 2023-03-10 [SC] 28251FE8EB0C84968EAC18F306F14AD19725323C uid ExampleNickname (This is an example!) <example@example.com> sub rsa4096 2023-03-10 [E]
This command in fact went ahead and created a key and a subkey, one of them is for encrypting files and the other is for signing them. At this point, you should be familiar with these terms. If you are curious about how it actually looks like, I will put below the public and private key, in the name of science. Please do not ever use this key for anything. This is an example, normally you should never be sharing your private key, it is not so private otherwise is it ?
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGQLrxkBEADEn2zpr620eVVmbIw+CsidlBSTjEatPuzf/EY3vLnK2tuULs8s fKwpWiPtU5//vDdtUirAF9BK+8rrMskLLFsFNlvkYGwRH2iOMKY5d+lmZVBND2yu u+XoEvhWgj77yfv76squrAiLdrHv9XYEJ1KynAnAfl/E06fUW0Flpda7v4VedPxX VG1qzQvnIpPzPspCbDmWMUkOjOEB45WLSkn/J3fZEGfVIXIncrJs6TqIJznP8GEo H+Rtmmr1nyRFBgQz/wXLC8bZ8rZ+ci+wcnR0fFj+ySXq3ec0Alqwx/SU3uuMUGs2 Cz34OUCBBMdo39xl5+iz69OT1a86gODASTYBUPNxqQh0bNC2jRrbgwBv/IBC2U+j Tx7IlNhT66ttFbFKLy6AprnkjuzEoVMFsukZzSqYUuO168BFrxopP3AO9ewJnSnR use8xxQsXNn1RC0qT6pO5gR1UxB3/eE4eqpklAAUaBm8u/63VNJIc3DenXiVolbF DYJiSP9nK/wTIiops2c9iXE+zNGT5KeyAE2m8zXn7ljIiSGSPffuBN4MtrXCtZHp CRQNPih7aSNU4oCTGupCqkIeHUeNOHl6RcSJ6KWI44mbzz9KGHVdaf0hxjJbIGkR FAVOwFqkciLsuOD5H+Od9RTWNrY1FJv3JXvsRiTMR1FMBAeYHIBjzqy7lwARAQAB tDtFeGFtcGxlTmlja25hbWUgKFRoaXMgaXMgYW4gZXhhbXBsZSEpIDxleGFtcGxl QGV4YW1wbGUuY29tPokCTgQTAQoAOBYhBCglH+jrDISWjqwY8wbxStGXJTI8BQJk C68ZAhsDBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEAbxStGXJTI80AgQAMKU KcckROBdAbGh9EygZwOQOH9SyBuAJmaOx4VEJqyqT1mEQEPAcj1lnWoZFoFphu8t zed9CuVrAJXzgyI4MsCGk5L6FTEvbFD+hXRVL1dFabFUt/7Hlh9VQES6cGYa4J4o dYL2zqoSMQ5HYahoUa8M6n+U3C2MahzM6XvRz126I58o2cH9B3WAe9aiOtXEgOaZ VPQ/JOi+z0+HmnTmSXB/3UQc1AvD7lnkIGA6N4IYSpGzgqO3euAW7f9R1JJnBq5f A52OlhDWOHN9hIvfw58p7UpO5892+seLdy2mRptbTccdg/T1xqLdgR5/uwdjzBkq 2exG6xV3sb3fxpnGjDScPRueBo4R+mH4NVCj46NqWbOv9lHZJ9mH80Ti2btubLja SaNOvaJwnIMlIv69EDmIjuAvp8+6lhzAN29WgjyA1dNNRKnsPuzsSJ4nMXmufT7D bxetQDtxo26yJ0rlba+c+0vjAwbAUSDhDs7yso26HjUhNfLoA2Zj9k0w9Q0hwjM0 QlPiyCxLfo+yVjpfOaRiRoaIXfExqngu5S3k5HfVjeFY9ElPFfEtCjrs22xTcD7z 6WMbWZPT1lwxjEudm98Q+vMjLFqChRDunakM7A3tVSJrC/7LEbgh96tieE2mW2o7 FCMtuRGXHfLD833l2hZDG7kyONefikYCX/hKSZ6puQINBGQLrxkBEACnvyKVRv22 0Nftm5wDoFjKrvFq7JuEH2aqeL7C75u0p2CuBRoFIXWr47IC7lGUxNx96Rqo/JuD HpCKUAcIK/FgvQrnadAPgz4TO93InpD8FUCtwNHeKz+/VpHFaw7nVXQ6JOpRmhJJ 6Xl6nYDmiGMj24NDIJPxSZlQEV8RtPjCy0QcvX8YXmi8DN87dAOqy3JEQ5OTsp/l jUr7xYAYPmoft2E2L4ueo0CiyCOyyCbOYB1uyoZyJz9rjAo72ZH4zhesAGFhLD6a LAVGc9R/l0nxsIcAbXdvfqHzGJhYRPXgRHOBKtmbQWR0YfEW/A0eIE8NgavAcAev vDS4KBvg0KM2PVvvDyAr4/GxknqDC5Dy4DkhFel+xqN4PNFxcHI3rnS7zoUZVJ2m B27V5ZYkcqP4+vR/T+OPht2qiJdFZVoj4VSGMxe2a19jT5zB71IaPpzsea3L8hPE 9qtLuagzXW4C9p8sXXewyP78Z6ipVRYK+befUsTUuy9LRORU7TcobXKG+fe8S/Pv ynSoRj0HMAXTjNsFBmvE1pr/GYE1CT4MzTdudx3BrCRj4c/iumKNDoJCNI+DhoLy 62dvR0LT44vBYR4956KhL2wQrXonPI7uVd6+dnKKLitUb+zlLyUutAdFu3/8IPdm lqgkFLJji+CSYY5PIUyuBV0EOlYhTcxo/wARAQABiQI2BBgBCgAgFiEEKCUf6OsM hJaOrBjzBvFK0ZclMjwFAmQLrxkCGwwACgkQBvFK0ZclMjwakhAAgN5UVyZ2XP6A laBRYOwRNgOecwdgZ04RDLJLRc0T9qGj7fsNb/MHWlEnwIuj/rhU5S9dy/Z2FXqF pRXeO4/l9Q/VDQNyw8x3CwFDHhi5TKs4e7RtN5n33PBuEc+AXjO150hiQtQqHFPG F+ku+wSLGJ+VnlPRvtjJOz2Dk3vzU4E3ArK3JsWBCo2MChFSGlN3HL0tA+TOrpV9 X/QrWdbSCEc0DvBKmgB5sZQaFEyhRKwOOxeGZKn2ktkNE0cQLfRjoiiW58RIMuRN IPvvT+EiZFHCxgVRjRsYDPZmTaDOoGgjzlpjMBeZFMJXyWVUtqc4m+Ko0uxKhnnG LXbKvI2c1faUoJUhgf0e4wy1hociNb4nzDZlm1pZZfedgURaCzuyL9QLIkihjLFk g549DC+usgXQJyjMlbRY61lC9ApFiZf0CWhkvh3xi7JQ7hyk3jlVE0HtloLr2xKg PNa7f05g3C5/9weE55uiDsetI8keGUnY5qRoL8mra6xyi6/OWDhSKIqE5jgOM7NF pHcEN6UQOJm1gG3X1uvdWGOQafyqTndurFFFlHOVADQVpvvjjChY/WBDhO2VDX+8 wE4UkZxLFLZS4V3gwH3DsZfOBsxQXNmeaO6geGNgKvZMAFBsSTPX6PBaBPbQiA0F 8Ub4vG0956XL64Rp4OLek9HRFeZmEK4= =hThS -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PRIVATE KEY BLOCK----- lQdGBGQLrxkBEADEn2zpr620eVVmbIw+CsidlBSTjEatPuzf/EY3vLnK2tuULs8s fKwpWiPtU5//vDdtUirAF9BK+8rrMskLLFsFNlvkYGwRH2iOMKY5d+lmZVBND2yu u+XoEvhWgj77yfv76squrAiLdrHv9XYEJ1KynAnAfl/E06fUW0Flpda7v4VedPxX VG1qzQvnIpPzPspCbDmWMUkOjOEB45WLSkn/J3fZEGfVIXIncrJs6TqIJznP8GEo H+Rtmmr1nyRFBgQz/wXLC8bZ8rZ+ci+wcnR0fFj+ySXq3ec0Alqwx/SU3uuMUGs2 Cz34OUCBBMdo39xl5+iz69OT1a86gODASTYBUPNxqQh0bNC2jRrbgwBv/IBC2U+j Tx7IlNhT66ttFbFKLy6AprnkjuzEoVMFsukZzSqYUuO168BFrxopP3AO9ewJnSnR use8xxQsXNn1RC0qT6pO5gR1UxB3/eE4eqpklAAUaBm8u/63VNJIc3DenXiVolbF DYJiSP9nK/wTIiops2c9iXE+zNGT5KeyAE2m8zXn7ljIiSGSPffuBN4MtrXCtZHp CRQNPih7aSNU4oCTGupCqkIeHUeNOHl6RcSJ6KWI44mbzz9KGHVdaf0hxjJbIGkR FAVOwFqkciLsuOD5H+Od9RTWNrY1FJv3JXvsRiTMR1FMBAeYHIBjzqy7lwARAQAB /gcDAp3BYQRyBXVB/wnsBz3RJeW0cVSHMrjs5A3E+EI6psSQ6MssGjE+eapYAzr6 Sol2Ju0lC/8iQkNpS4D7qs6/c2grXMhRHUIQQ6MqesYCi7v45yYZfu56LCYJ1rp6 PH9m3VN6iyr2yCOiDGZHBOB53ZrFrrKprbEk5+Npt4nmtAzRv2jJiQe30/q8Gi8A gSGYf/V4Ysu2nOVSe6A8g3tXejwa2M/THSk2+x2+QWLVZnyCmAG22qJva6kJxQUz FVafV3WLbOJiJCe7YRbZ8VpcwIVBlJZLHiEP7+D4bOJHFD4U4gayXXgw4KMLxR8E KV2LeYbr/eDwnIvJ2uh4QZJc4w468wtcvdoDS5HylmVbwBQfv+irsANHUPC2eQ2z lI9bLSgg7BvxfHk/MPEqQ/mtneEafjJag+p2QKhde1OrbTf5L8TcoD+QW8iahW4z qASyQ2Vr2c0rekoUipJfrHdn0sX4HTmK93ufDUTnPpnTvv8SAcBbck8ohnws6HJ0 ClW7ULedGyOwgtsVMwqd1pdNDG+7zieD1NetKDRGBatD4cFS5iBWrz5dvNcY6xJz yIjzOw0tcbRiJVluJNQG/zQXGyAqvqt6Y0yzUo/DkKbq/8GUCLkYu6gcqMdT+Mj5 DvnmRXMPlNUBsN5e8PSE3WCOTkJvAXNnZFcgFli+C+buWCOgcaauNQK/WJy58k3Y RqpcDKYOlWhRcDaG7QOl/cZea9ZKv43Q7b7jIuDXchnITohdy/ULq4NYHahMS5K2 zhRtSt/ir0M/TaeZwEHu4mxC12PbS6rhq5vxWSdFj9/WoTmXzJTD38fr1BgB360i NO0yaTkYwC/2/+sECARplFmCAbylrrtuWWEwmXn8OgPEjmKuC2zaJRRP4aegiSNP OXub2XtM/5+v/+pr4BjZEC0mqs+sIh0cNokc58wMfOFaErAA8hEdyZ8lrpFNwmOe +dlw2Mor1qym/8A28GlJHYvu1dVOWv3qNEVjzY2gR/MDT3yujXNA602txSs4y4bR QdxXDn0KZFKQkMwPjuhGvv+JhD0jE0HHof57LgrKnqfTMwnvHr+RS7d0Lz7Iskiv UHOY5tm0ep0ghfsIaQo+Ye9wXb32cU6Am9kCcWMq1MAGefpaOU3JuWh9dFynSFW7 a6f/GJc0gws9nQ1AQqBkCwwckm//iG2eEuqJldYRFveXHiC4GfS3DC8r9bZ9KTnO 7quQUxGnzgL3+V/YnrvBzvgHtg5kOULvBWwOn/heRmA3qw2/fZj4QGljbsxG2h4C jiNJpECstswwMJ8Ma+yMsi5O4yYlIpXoolwPxHQyjFrgUuiR7HHjzs/w6cvyeYdo FSTIHH/pPogBN1fYJzjv+7lRuCwEa9ztpyej7AzjBJpbog27Yv8Ifwoa0fBMg1Tt y1ngbROuJB2QF7HvznJG30TPogyFkhYlWq7VdQDYjH4P2XQqlUnufrkAX50dNofZ pEB74yp/lpesaJ21fjifV2dXFRHm9UxA7tbts5xtvEciKXeTTPQlkjvA7a7v+FV9 e9wr1opC/URu+3CuYt967e4eV8SixHMKLFU/OcTnDtkZs2N2Sa4mXhBNr2DYdT+S uIKn9DhkbxhspYveCEvANFVGiPM5cY1BJrNU8a9z1I7n0GptlYU2QlWVZvCg6XUW ioHr5DHZv2rCwn9Itt9Qrq0I2cafbyRrvKWCLaIWzFFrILT3ruQlUOx3p84BkijR /yCantwsCEeHFXedVFJ7DCBaHZllSS+r+LeQrx4DoNmlMXeMeeAQSim0O0V4YW1w bGVOaWNrbmFtZSAoVGhpcyBpcyBhbiBleGFtcGxlISkgPGV4YW1wbGVAZXhhbXBs ZS5jb20+iQJOBBMBCgA4FiEEKCUf6OsMhJaOrBjzBvFK0ZclMjwFAmQLrxkCGwMF CwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQBvFK0ZclMjzQCBAAwpQpxyRE4F0B saH0TKBnA5A4f1LIG4AmZo7HhUQmrKpPWYRAQ8ByPWWdahkWgWmG7y3N530K5WsA lfODIjgywIaTkvoVMS9sUP6FdFUvV0VpsVS3/seWH1VARLpwZhrgnih1gvbOqhIx DkdhqGhRrwzqf5TcLYxqHMzpe9HPXbojnyjZwf0HdYB71qI61cSA5plU9D8k6L7P T4eadOZJcH/dRBzUC8PuWeQgYDo3ghhKkbOCo7d64Bbt/1HUkmcGrl8DnY6WENY4 c32Ei9/DnyntSk7nz3b6x4t3LaZGm1tNxx2D9PXGot2BHn+7B2PMGSrZ7EbrFXex vd/GmcaMNJw9G54GjhH6Yfg1UKPjo2pZs6/2Udkn2YfzROLZu25suNpJo069onCc gyUi/r0QOYiO4C+nz7qWHMA3b1aCPIDV001Eqew+7OxInicxea59PsNvF61AO3Gj brInSuVtr5z7S+MDBsBRIOEOzvKyjboeNSE18ugDZmP2TTD1DSHCMzRCU+LILEt+ j7JWOl85pGJGhohd8TGqeC7lLeTkd9WN4Vj0SU8V8S0KOuzbbFNwPvPpYxtZk9PW XDGMS52b3xD68yMsWoKFEO6dqQzsDe1VImsL/ssRuCH3q2J4TaZbajsUIy25EZcd 8sPzfeXaFkMbuTI415+KRgJf+EpJnqmdB0UEZAuvGQEQAKe/IpVG/bbQ1+2bnAOg WMqu8Wrsm4QfZqp4vsLvm7SnYK4FGgUhdavjsgLuUZTE3H3pGqj8m4MekIpQBwgr 8WC9Cudp0A+DPhM73ciekPwVQK3A0d4rP79WkcVrDudVdDok6lGaEknpeXqdgOaI YyPbg0Mgk/FJmVARXxG0+MLLRBy9fxheaLwM3zt0A6rLckRDk5Oyn+WNSvvFgBg+ ah+3YTYvi56jQKLII7LIJs5gHW7KhnInP2uMCjvZkfjOF6wAYWEsPposBUZz1H+X SfGwhwBtd29+ofMYmFhE9eBEc4Eq2ZtBZHRh8Rb8DR4gTw2Bq8BwB6+8NLgoG+DQ ozY9W+8PICvj8bGSeoMLkPLgOSEV6X7Go3g80XFwcjeudLvOhRlUnaYHbtXlliRy o/j69H9P44+G3aqIl0VlWiPhVIYzF7ZrX2NPnMHvUho+nOx5rcvyE8T2q0u5qDNd bgL2nyxdd7DI/vxnqKlVFgr5t59SxNS7L0tE5FTtNyhtcob597xL8+/KdKhGPQcw BdOM2wUGa8TWmv8ZgTUJPgzNN253HcGsJGPhz+K6Yo0OgkI0j4OGgvLrZ29HQtPj i8FhHj3noqEvbBCteic8ju5V3r52coouK1Rv7OUvJS60B0W7f/wg92aWqCQUsmOL 4JJhjk8hTK4FXQQ6ViFNzGj/ABEBAAH+BwMCPDJetGWvmU//m7fUNAYpKEyVZeE2 2wTy/rYhwZ1JnhfpnMQT/v27LWqqxCu3h7W5AuIyK6KvNXXJGpn1nBMk6TkIz2VC q4Swt8dY/pkECaCqCGW21Iy4napo3ZlhvwIuPudCp5L1usCaMdz4e7l9GN+G1BiU bPIHI9k5yvioMj6x27y/ba0PtuMhCjSNubN1+1v0FxtHakoh6UtyX+nBNfHZo44S QprfF5vMRVFea7M+pJlFgeFKDC+NFaPFZbzAuV1VmvuahHNu/mHLzICSzg7PwG8N o1AacvdqeiKZSletRub2Jqj5BQ9VmJTSw5SjZX7VEwvNkBzvptkjCpzsl69Zx+aQ eAKI9QPqHNG1D1MlP7FESrL5Q7s3QJJO3niG9GqEmD4EbyOl+Jt6zAvxROUsNKwh ipo5ZpwSpScH0mu1BaPRlGzRIHDbsuVcQPMw4dZzOLbiCUdp6xLxrgNk1UxTA2iV D99xUjRgs3zENMA3esVBg7XiAq39yeABY9oCeod9DYiCqPIuJTmP1MkNlo2HDlMv jqCER0DF8IQGfSqeFLvQl0SIGFjfmLgTaZuAG7MrAh83XuPWeDBjSi/ZQG+u2kr5 j8F/S+fqa9fvWyOazI676Zd3DTvjXrKodUg52YuvctSL22CudMdJazpHmA5IOH4/ vSgHv7a9DiZ5Lpkgir6G1E3r76ko3quKKkLIXQgG2PAKCURMi+EkWbOjIRmvQUK1 TYkxHCyUr/an01+ZXXhWotNy69S4tQi0wZrHcAwDCWHFYNNcQTtpSddz3lmeMNVj x97WJIv8OJuBEGNXAzz8m8Q8jN22DNKtR3/DV+cqB9uHUXWUYbyHe4ifFFuABsxL hu4k7P0jZ2t/Cn0LcdLg3QNm24fVRTvscJ8yx0FvwsILpJ9GhMYL0c2/X/zhjY7k RBMev3i89jAfXSqL5Hi0VFLvgyYhq+GsnULTlJO3tiRv21QBvvR848kCUpV+eT/z ecz/itWxWCIERmH09Ov5iXSxBbDO6qmzEXA1ceOTVgijdUrlvxaX+wVu5kI75V2u dIjfBsXeMe7zG2ZyXCN++Q2dI+CK6wI/q3it24Vt7EUU+BaG84rhnFs6SKpvJ8zG MVLPXCowlaGfgz/pFOjdw/hZRG/yfGqfdL7er1X+Ygmh9PTR7Vy1pRhqOWlCCDUr 5sm2OywPDAU8L/gu0BC273a1xqgWA6qnT091qFgUXYMLUw6jWd7bRgK++w49ILzK x2m+HBfaO9xcxbGzYflZn+JP1CAEnWJmCQoyzR6I/IXzAHMCmQCMfnPrphnqhblH KATpmpRlM3Sg0woJe93Gt6e50s8p/yCqGROQ8/NIZ/Qjj/R+De2Qf3QavFNLyQNf TOS2sERki8buOPc+kfSvQYxLCPl2fDiN6sOnNghpgTMXDfLiFGQoxpHhhtnT32iT uU3t7OjWAXrf3dtWIpOIx5V+uA1lT5hmotBLl92TJK/2SR1DGX1Y153RG4/kwOt+ +9JdFZjkOVW1xuzPY+ayieJEjS1Q7Kn00UyPvBD4Zr+7TEn5qd8NhY3aRxwFvoxK JzJjRZd4cZTgKJGOqZTgxRMHNlyH6RPEdEwIsUV/7Bic3QfcT1BiY2FVX8wNZQWE g1r8Mp7Dpo4AjY6ukGXA9UcmFyeO/fW4XXCPDbyn5clV//pUZCisdy0A2UdlCUW0 FBClV9o8IcH8/FaZoOpN4IVCWf1PsZU5xOirCXKaqjuz8fbLgKJbKTGo/eeHXczy 9pCAPjMPJqOhlOPHDqz1iQI2BBgBCgAgFiEEKCUf6OsMhJaOrBjzBvFK0ZclMjwF AmQLrxkCGwwACgkQBvFK0ZclMjwakhAAgN5UVyZ2XP6AlaBRYOwRNgOecwdgZ04R DLJLRc0T9qGj7fsNb/MHWlEnwIuj/rhU5S9dy/Z2FXqFpRXeO4/l9Q/VDQNyw8x3 CwFDHhi5TKs4e7RtN5n33PBuEc+AXjO150hiQtQqHFPGF+ku+wSLGJ+VnlPRvtjJ Oz2Dk3vzU4E3ArK3JsWBCo2MChFSGlN3HL0tA+TOrpV9X/QrWdbSCEc0DvBKmgB5 sZQaFEyhRKwOOxeGZKn2ktkNE0cQLfRjoiiW58RIMuRNIPvvT+EiZFHCxgVRjRsY DPZmTaDOoGgjzlpjMBeZFMJXyWVUtqc4m+Ko0uxKhnnGLXbKvI2c1faUoJUhgf0e 4wy1hociNb4nzDZlm1pZZfedgURaCzuyL9QLIkihjLFkg549DC+usgXQJyjMlbRY 61lC9ApFiZf0CWhkvh3xi7JQ7hyk3jlVE0HtloLr2xKgPNa7f05g3C5/9weE55ui DsetI8keGUnY5qRoL8mra6xyi6/OWDhSKIqE5jgOM7NFpHcEN6UQOJm1gG3X1uvd WGOQafyqTndurFFFlHOVADQVpvvjjChY/WBDhO2VDX+8wE4UkZxLFLZS4V3gwH3D sZfOBsxQXNmeaO6geGNgKvZMAFBsSTPX6PBaBPbQiA0F8Ub4vG0956XL64Rp4OLe k9HRFeZmEK4= =QeIL -----END PGP PRIVATE KEY BLOCK-----
Congratulations! You have a GPG key now.
A key that you have can practically be used for anything. Any file in your computer is fundamentally a long sequence of binary numbers. Therefore, it can be encrypted using your key. Keep in mind that this works best with simpler file formats. File types like Microsoft Office Files sometimes have proprietary source code that is required to use the file. These types of structures can break, and become unusable after encryption. You really shouldn't be using these files to store data to begin with, but if you will, you have been warned.
// Encrypt a file for a recipent, in this case my public key is used // to encrypt this file $ gpg --encrypt testfile.txt --recipent berk@mathwizard.xyz // Decrypt a file with this command, it require the master password and the // private key of the intended recipent // you can also specify an output name, by defult it adds a '.pgp' extention $ gpg --decrypt testfile.txt.pgp --output decrypted.txt // You can also use a symmetric cipher, using a passphrase $ gpg --symmetric testfile.txt --output testfile
As a general rule of thumb, it is a good idea to backup these materials that you obtain, in a space that is away from the internet. A good old USB Drive would do the trick. Anything on the internet, no matter how secure you think it is, or no matter how big of a company is behind it, is and always will be a subject for data breaches. You made a step in the right direction to minimize the effect of this threat, at least for you.
From here on, possibilities are endless. As you dive deeper into this ecosystem, you will need to learn more about the programs you are using, and what the underlying structure is. Sometimes, you may need to ditch some old habits, and start using a new program for better security or privacy.
Before we wrap up, I would like to debunk a common myth in today's so called modern society. The fact that somebody has interest in encryption tools, and uses it on a daily basis does not mean that they are a criminal. The idea that one needs to have something to hide, if they are interested in privacy is very flawed and actually needs to die. There is nothing wrong about feeling discomfort as a response to someone or a corporate entity constantly having access to your belongings. I am not here to tell you that you should care about this, this may be completely fine for you. However, when somebody does care about this, it is not necessarily because they are an edgy looking kind of guy with a hoodie in your basement, operating an El Chapo business.