EncryptPad is an open source OpenPGP symmetric encryptor and editor for text and binary files. Edit encrypted files in memory on Windows, Mac and Linux with ergonomic user interface. Generate strong passwords. Protect files with strong random keys. Use as a password manager. evpo.net/encryptpad
πŸ‘︎ 30
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/evpo
πŸ“…︎ Feb 29 2016
🚨︎ report
Encrypt with OpenPGP (mac) ---> decrypt with GPG. Why no worky?

I'm just starting to learn this stuff, everything was going great, then I hit this snag. Here's the deal:

I'm practicing solo, using two laptops (one mac one pc), two email accounts, and two key combos. I can encrypt a message on the pc using GPG, send it to the mac, copy it from webmail on the mac to text, and use OpenPGP to decrypt the text. Works great, no problem.

But when I write a message in textedit on the mac, encrypt using OpenPGP (and yes I'm encrypting with the correct public key), copy to webmail and send to the PC, paste into GPA's clipboard, and click decrypt, I get an error message that says "Clipboard" contained no valid encrypted data.

Tried several times, also tried sending the encrypted message in an attachment, and simply saving it to a thumb drive and moving it from the mac to the PC -- same error every time.

Any ideas what might be causing it? Help is much appreciated for this noob.

πŸ‘︎ 9
πŸ“°︎ r/GnuPG
πŸ’¬︎
πŸ‘€︎ u/properjohn
πŸ“…︎ Sep 19 2014
🚨︎ report
EncryptPad is an OpenPGP symmetric encryptor and editor for text and binary files. Edit encrypted files in memory on Windows, Mac and Linux with ergonomic user interface. Generate strong passwords. Protect files with strong random keys. evpo.net/encryptpad/
πŸ‘︎ 13
πŸ“°︎ r/opensource
πŸ’¬︎
πŸ‘€︎ u/evpo
πŸ“…︎ Feb 23 2016
🚨︎ report
The Who/What/When/Why/How of TAILS, why all crypto users should familiarize themselves with the ultimate form of crypto safety/privacy.

I've seen alot of security posts around here but in the year or so I've been around here I don't think I've seen anyone do a thread specifically dedicated to TAILS.

Half of this is just me talking, some of it is copy pasted from the TAILS wikiand the main website

#Who should use TAILS

If you are in any way concerned about privacy, safety, or anonymity. Then you absolutely must at least know that TAILS is an option.

#What is TAILS?

TAILS stands for The Amnesic Incognito Live System

TAILS is a portable operating system that protects against surveillance and censorship.

It is called an amnesic system because it is set up to wipe itself (forget/amnesia) every time it reboots. That is to say it leaves no trace of anything that was done while using it, because it automatically erases itself completely every time it shuts off.

All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no digital footprint on the machine unless explicitly told to do so.

So in the simplest terms, you know when you're booting your computer and there is an option to hit f8 or f5 or whatever to pull up boot options? If you plug in a TAILS USB into any computer, boot it from the USB, it will load a fully operational privacy based Linux operating system that you can do your work on and know that you are safe.

#When should I use TAILS

Whenever you are unsure about a connection, concerned about malware, are travelling and need to conduct business on foreign wifi, or in any situation where a zero digital footprint is desired.

When there is a reporter in a territory where government is hostile needs to pay an informant for information, TAILS + Monero allows them to meet at a random coffee shop, execute a crypto transfer on public wifi, send encrypted information to where it is needed, and then shut down without a trace.

#Why use TAILS

In a world where we are inundated with constant scam attempts, malware, fake apps, and god knows what other methods people are using to hack and steal your money/crypto it is important to know there is a tool available to you that will reduce the likelihood of you being a victim, to basically zero.

#How to set up TAILS

You can download and follow the steps on how to set this up [here](https://tails.bou

... keep reading on reddit ➑

πŸ‘︎ 6
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/DaveinOakland
πŸ“…︎ Aug 03 2021
🚨︎ report
Encryption Tools

Learn about free, open-source, and secure methods to encrypt your sensitive data and keep it safe from prying eyes.

  • VeraCrypt is an open-source freeware program for on-the-fly encryption. With pre-boot authentication, it can build a virtual encrypted disk within a file or encrypt a partition or the full storage device.
  • GnuPG is a GPL-licensed cryptographic software alternative to the PGP suite. GnuPG complies with RFC 4880, the current IETF OpenPGP standards track specification. PGP (including Veridis' Filecrypt) are currently interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a component of the Free Software Foundation's GNU software project that has received significant financing from the German government.
  • 7-Zip is a free and open-source file archiver, which is a software used to compress groups of files. The command-line program p7zip is used on Linux, MacOS, and other platforms, and it integrates into many interfaces such as FileRoller, Xarchiver, and Ark.
  • Cryptomator - Provides free client-side AES encryption for cloud data. Free and open source software: There are no backdoors and no registration.
πŸ‘︎ 2
πŸ“°︎ r/TechFrame
πŸ’¬︎
πŸ‘€︎ u/50in
πŸ“…︎ Sep 19 2021
🚨︎ report
GPG encrypt your seeds

DAFUQ is that GPG?

TDLR: it is a open source cryptography tool that let you manage a keyring (public/private/authentication keys), decrypt, encrypt, sign, verify operations and also login (gpg keyring can hold a SSH key).

You can use it to safely store your crypto seeds into encrypted files instead of saving them on seeds.txt.

GPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (same as PGP)

Example GPG usecases for cryptoverse

  • if your relatives also got GPG private key, you can setup a dead man trigger where you put your GPG encrypted crypto seed with his public key into your email and setup to send that email after X days inactivity;
  • you don't need anymore to put the ledger into the ass. You just email your GPG encrypted crypto seed to yourself, put your private key into micro sd and in your laptop. Recover everything when you arrive at destination;
  • you can safely put your symmetric encrypted private key into a bunch of micro sd and labeling them one, asymmetric encrypt your crypto seeds and put it into another bunch of sd labeling them two and start hidden it around places: into friends gifts, bury it, put in a safe...even if someone manage to find the two micro sds, they still need the asymmetrical password for you private key that only you knows.

Install GPG

You can find all download links at gnupg dot org

  • Windows has GnuPG installer;
  • On Mac you can homebrew it:

​

brew install gnupg 
  • Linux distros usually has gpg on their repositories:

​

# on arch (i use arch btw)
sudo pacman -S gpg 
  • On android you can search for OpenKeyChain;
  • On iphone I cannot recommend anything open source that isn't paid;

Usage

I will cover cmd usage, but you can use CLI (kleopatra or seahorse).

You can fire the gpg help to check if gpg is correctly installed :

gpg --help

and it will print a nice help page with all gpg commands.

Creating your private key

gpg --gen-key

The above command will fires up a interactive prompt to create a new key pair (public/private key); you'll be asked basic information, also don't hurts to make the key as large as possible: 4096 bits.

Exporting your private key

You will run below command to check your key ID:

gpg --list-secret-keys

You need to replace XXXX from below command with your key id (your name or the hex key id):

gpg --export-secret-keys XXXX > myprivatekey.key

Backup the files. This key is like

... keep reading on reddit ➑

πŸ‘︎ 11
πŸ“°︎ r/CryptoCurrency
πŸ’¬︎
πŸ‘€︎ u/warlikeofthechaos
πŸ“…︎ Jul 22 2021
🚨︎ report
"What the heck is a Yubikey and why did I buy one?": A user guide

(EDIT: Besides Reddit, I've also put this up on Github Gist)

So while looking for information on security keys before getting one myself, I got very confused reading about all the different modes and advertised features of Yubikeys and other similar dongles. The official documentation tends to be surprisingly convoluted at times, weirdly organized and oddly shy about a few of the limitations of these keys (which I'm making a point of putting front and center). Now that I have one, I decided to write down everything I figured out in order to help myself (and hopefully some other people reading this) make sense of all this.

Since I'm partly writing these notes for myself, there might be some back and forth between "explain like I'm five" and "I'll asume you have a minor in computer science". While I could have made some of those explanations simpler, I really wanted to lay down some of the inner workings of the key enough to make what it can and can't do clear, which can be hard to boil down into making it simple (let alone short, I'll be the first to say I really went overboard with how long this turned out to be).

I'm also writing most of these sections with the "fully-fledged" Yubikey 5 models in mind, given the other available models support subsets of that. The limitations are usually the same across all Yubikey models, but I'll try to point out the differences where I've managed to find any.

So, then, what's a Yubikey?

TL;DR of Contents

(you know you're going to lose points for brevity when you need a table of contents for your Reddit post)

  • Part 0: It's a stupidly small USB drive
  • Part 1: It's a WebAuthn authenticator
    • Part 1a: Resident keys (FIDO2)
    • Part 1b: Attestations (FIDO1)
    • Part 1c: PINs and user verification (FIDO2)
  • Part 2: It's an OATH One-Time Password generator
  • Part 3: It's a CCID smart card in USB/NFC form
    • Part 3a: PIV smart card
    • Part 3b: OpenPGP smart card
  • Part 4: It's a virtual keyboard that can type up to two (2) passwords
    • Part 4a: Yubico OTP
    • Part 4b: Static password
    • Part 4c: Challange-response
    • Part 4Β²: NFC tag
  • Part 100: It's all write-only, you can't just "make a backup later"
  • FAQ
    • What's different about the FIPS models?
    • Can I update the firmware on my Yubikey aft
... keep reading on reddit ➑

πŸ‘︎ 177
πŸ“°︎ r/yubikey
πŸ’¬︎
πŸ‘€︎ u/sm-Fifteen
πŸ“…︎ May 10 2021
🚨︎ report
Read before posting

Read before posting

Tails has very complete documentation, before posting, try to give it a look. It's likely to have the answer to your questions https://tails.boum.org/doc/.

A few common issues posted here that are already addressed in the documentation:

  • If Tor does not connect, if you see no Wifi icon, then look at https://tails.boum.org/support/known_issues/#wi-fi for an explanation and backup solutions.

  • If you have issues booting Tails, you can follow https://tails.boum.org/doc/first_steps/start/pc/, it may help (sometimes it does not ; sometimes just using another USB stick can fix the problem).

  • If you cannot import a PGP key, check https://tails.boum.org/support/known_issues/#openpgp-import.

  • If you are using a recent (2018+) Macbook and your touchpad/keyboard do not work, it is a known issue, you have to use an external keyboard/mouse : https://tails.boum.org/support/known_issues/#mac

  • If your persistence does not open anymore, https://tails.boum.org/doc/advanced_topics/persistence/check_file_system/ should show you how to fix it.

  • If you try to launch a commandline application, you can use torsocks / torify like https://tails.boum.org/support/faq/#youtube. Note that Tails discourages running untrusted applications that are not included https://tails.boum.org/doc/first_steps/additional_software/

  • If you want to use rufus, unetbootin, make multiboots sticks, Tails advises you to not do so https://tails.boum.org/support/faq/#unetbootin (also see https://tails.boum.org/doc/about/warning/). It is very likely such a stick will not work at all or not work properly. Stick to the official instructions: https://tails.boum.org/install/

  • If you are seeing an error about https://tails.boum.org/gdm while starting Tails, maybe open and read (yes, really) that link before posting :-). If Tails devs say your graphic adapter is not supported, sorry, but it is not supported, and there are low chances that random strangers will be able to make it work, if the developers can't...

You can always check to see if your question is covered in the Tails FAQ https://tails.boum.org/support/faq/. It genuinely covers most things people think of. There is also the list of known issues https://tails.boum.org/support/known_issues/ and known issues for graphics cards https://tails.boum.org/support/known_issues/graphics/. There is a good chance your problem is already known.

Those few links are NOT an exhaustive list, but should cover >50% of the questi

... keep reading on reddit ➑

πŸ‘︎ 72
πŸ“°︎ r/tails
πŸ’¬︎
πŸ‘€︎ u/carrotcypher
πŸ“…︎ Feb 14 2021
🚨︎ report
A different kind of DD - encryption and trust when prominent accounts are getting banned

##THIS IS NOT INVESTMENT ADVICE BECAUSE IT'S LITERALLY NOT, I'M JUST POSTING ABOUT ASYMMETRICAL CRYPTOGRAPHY LMAO

(CC /u/rensole, /u/WardenElite2, /u/HeyItsPixel, @mods)

The span of just a day or two has seen the banning of not one but TWO prolific authors of insightful, detail-oriented DD, at the hands of shillbot report-spam. There's no reason to believe that's going to slow down, either. Sure, reddit accounts are free and those affected can just message a mod for restored posting access, but this is opening up the possibility of a potentially far more damaging shill attack: impersonation. Hell, someone could register the account /u/WardenElite_2 (the real one doesn't have the underscore) and sow all kinds of confusion throughout the subreddit. Or worse, an impersonator acting quickly after a ban could get themselves canonized as the "real" one. Yes, currently they're confirming themselves through pre-etablished Twitters, but in the absence of a blue checkmark that's also highly exploitable.

Luckily, there's a MUCH more secure, reliable method than referring to an alternate social media platform. It's called PGP - Pretty Good Privacy, an ancient online cryptography standard that's stood the test of time. You might think, what's the good in encrypting messages instead? That doesn't certify who anyone is! That's right, it doesn't. But encrypting communication isn't the only thing PGP can do. You can just as easily use it to prove your identity, by signing a message confirming that an account is authentic. And as long as your public key (more on what that is later) is written down in enough places, that authenticity can be verified without needing any confirmation from a different social media platform.

Before I continue, I'd like to note that even if you're not a prominent DD author, you still have an important role! If someone posts their key, SAVE THAT SHIT because there's no use in this if people aren't recording each others' keys.

So, you're probably asking, terminally bored of watching the line go up and down, this sounds fun and useful, how do I set it up?

Well, step one, you're going to need some software. If you have a primary computer you use, I'd recommend installing it on there, but if you're primarily a mobile user, don't worry, there are apps you can use.

  • On Windows, the goto is gpg4win - It's bundled with a nice UI called Kleopatra.
  • For Mac OS X, GPGTools
... keep reading on reddit ➑

πŸ‘︎ 31
πŸ“°︎ r/GME
πŸ’¬︎
πŸ‘€︎ u/PieFlinger
πŸ“…︎ Mar 19 2021
🚨︎ report
Using OpenPGP App in Windows

Greetings, Ledger community!

After several hours of research on my part, I have turned up very little information on this topic, so I have a question for the more technical members of this community. Any dev help would also be greatly appreciated - I'm just a few hairs short of emailing the devs directly on this one.

Has anyone successfully configured the Ledger OpenPGP app to work with Gpg4win? The official documentation for the app is several years old, and still includes a "to be continued" section for Windows. I've been playing around with GPG all night - since the Linux/MacOS versions appear to work perfectly, I'm guessing the main issue is the way Windows handles smart cards. Gpg4win does indeed use a Windows smart card daemon, although as of yet I've been completely unable to edit its configuration through the command line.

I'm not exactly literate in Windows device communications, or I'd consider coming up with a solution myself. It seems like the nuts and bolts are all there, yet the Ledger app hasn't been updated in a few years - how hard can it possibly be to get GPG to play with the Nano X on Windows? Or has the project simply been abandoned?

If anyone knows of a workaround for this seemingly tiny issue, or if I'm completely overlooking some bigger issue preventing compatibility on Windows, please let me know. I'd love to get the application working with any of the Gpg4win programs (or an open-source alternative).

πŸ‘︎ 2
πŸ“°︎ r/ledgerwallet
πŸ’¬︎
πŸ‘€︎ u/ProfessorXenon
πŸ“…︎ Jun 08 2021
🚨︎ report
Kleopatra alternative for macOS?

Hello everyone,

Could someone point me in the right direction for an alternative for windows Kleopatra? I'm running MacOS Big Sur 11.1

I've had a look at OpenPGP but I was ideally looking for a program with the notepad function as a means of encrypting/decrypting messages more efficiently, as well as verifying authenticity of PGPs with the same visual clarity Kleopatra provides.

Thanks for your help :)

EDIT: Added additional info.

πŸ‘︎ 41
πŸ“°︎ r/onions
πŸ’¬︎
πŸ‘€︎ u/illegalhello
πŸ“…︎ Feb 01 2021
🚨︎ report
How to anonymously host the continued development of youtube-dl offshore

Original sources of this guide (might be more up to date in case you're viewing a mirror of it):

https://old.reddit.com/r/youtubedl/comments/jktx5b/how_to_anonymously_host_the_continued_development/

https://raddle.me/f/AntiCopyright/121477/how-to-anonymously-host-the-continued-development-of-youtube

In this guide I will go through how to anonymously host the continued development of youtube-dl offshore using companies that have a track record of being very resilient to DMCA takedowns. As a general disclaimer, youtube-dl is not illegal, no matter how much the RIAA wants it to be. Hosting it is not illegal, but the RIAA doesn't care about what's legal, so we'll have to act accordingly and not rely on companies that will bend over backwards for them. This post is basically my way of flipping the bird to the RIAA.

DMCA ignored hosting providers

RIAA report including DMCA ignored hosting providers

MPAA report including DMCA ignored hosting providers

United States Trade Representative report including DMCA ignored hosting providers

ESA report including DMCA ignored hosting providers

Europol report including DMCA ignored hosting providers

La Liga report including DMCA ignored hosting providers

Former bulletproof hosting reseller reviews offshore hosting providers

Former bulletproof hosting reseller on what the most warez friendly hosting providers are

(Novogara aka Ecatel recently got busted for tax evasion and are shady as hell in general, allowing anything to be hosted on their servers, so it's best to stay away from them.)

Take into account what data center the hosting provider uses. If they don't run their their own data center the company running the data center can shut down the

... keep reading on reddit ➑

πŸ‘︎ 184
πŸ“°︎ r/youtubedl
πŸ’¬︎
πŸ‘€︎ u/Fuck_the_RIAA
πŸ“…︎ Oct 30 2020
🚨︎ report
Verifying the trezor suite download

I've downloaded Trezor-Suite-21.3.2-mac.dmg along with Trezor-Suite-21.3.2-mac.dmg.asc and satoshilabs-2021-signing-key.asc from https://suite.trezor.io/. When I run

gpg --import Trezor-Suite-21.3.2-mac.dmg.asc

I get "no valid OpenPGP data found."

Any suggestions on how to verify the download?

πŸ‘︎ 8
πŸ“°︎ r/TREZOR
πŸ’¬︎
πŸ‘€︎ u/apasho
πŸ“…︎ Apr 04 2021
🚨︎ report
Basic PGP usage (Guide)

Hey, I tried posting thins on r/darknet but it's still sitting there unapproved for the 5th day. Since this is another subreddit that deals with darknet markets I thought that fellow redditors could find it useful. Here's the PGP usage guide.

Downloads

Windows: gpg4win

Mac: GPG Suite (this came up after just a bit of googling, I don't use Mac personally)

Linux: gnupg or gnupg2 (shown bellow)

Installing on Linux

I'll be using Linux in this guide and I'll show you how to work with keys through the terminal. There are graphic tools as well (Kleopatra for example, which comes with gpg4win).

Debian: sudo apt install gnupg2

Fedora: sudo dnf install gnupg2

Arch: sudo pacman -S gnupg

Generating a key

Use gpg2 --full-generate-key to generate a key and you should see something similar to the output bellow.

gpg (GnuPG) 2.2.19; Copyright (C) 2019 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
  (14) Existing key from card
Your selection?

As I don't want to get this too advanced we'll go with the defaults. Choose 1 or press Enter (as 1 is already default option) to continue.

Next, the program will ask you for your desired key size.

RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (3072)

The default 3072 but we'll go with 4096 since the longer the key is the harder it is to replicate (not like we can easily replicate 3072 bit keys).

The program will now ask if you want this key to expire.

Please specify how long the key should be valid.
         0 = key does not expire
      <n>  = key expires in n days
      <n>w = key expires in n weeks
      <n>m = key expires in n months
      <n>y = key expires in n years
Key is valid for? (0)

We'll choose 0 as we don't want this key to expire, there may be some scenarios where you just need this key temporarily but since this key can be used for 2FA we certainly don't want this one to expire. Choose 0 or just press Enter since 0 is already selected by default.

Press y when it asks you for confirmation.

It will

... keep reading on reddit ➑

πŸ‘︎ 157
πŸ“°︎ r/onions
πŸ’¬︎
πŸ‘€︎ u/vert3xo
πŸ“…︎ Nov 01 2020
🚨︎ report
It's A Twofer Kinda Night

Guess who's back. Back again.

Yeah, it's me. I felt like fucking with something again, so here goes. What follows is a short primer and a slightly modified version of the existing netsec page. I'd like to think about folding it into a general persec page, including netsec, though of course this isn't necessary. There are tools that I, not a sysadmin nor particular expert, view to be outdated here, and I have proposed cuts and swaps.

I am also by no means an expert on computer security, so have left most of the tools on the page intact and changed very little on that front. I know what works for me, but without sitting around paying a pentester to try to wreck my shit I don't actually know how effective it is. If you are an expert, I could certainly use some help here. Note also that this is a start, a work in progress, and ideally I'd like to expand into a general security section, perhaps splitting off to various pages in their own right.

Let's get after it, comrades.

#What is Persec?

Persec is short for personal security. In communities that practice security or do intelligence, or both, most things are shortened into such portmanteaus, and it's useful to learn them. Persec regards guarding your personal information (ie, who you are, where you're from, what you did...) from anyone who doesn't need to know. To what degree you do this is entirely your prerogative.

#Why should I care about security at all?

Well, you are presumably a leftist, and may or may not be aware, but the US Government as well as other groups and orgs do not have a good history with regard to treatment of leftists or marginalized people. See Fred Hampton, or the FBI smear campaign against MLK, for two immediate examples. In addition to that, you don't send your bank info to the Nigerian Prince emailing you, do you? Same thing; you're just consciously aware of that threat.

#So What Kind of Information Should I Guard?

All of it. If it is not intrinsically necessary for what you are doing, do not give the information. This is nuanced. Perhaps your date is asking about the neighborhood you live in. This isn't necessary, but you will weigh the risks vs the benefits of talking about it and/or seeming rude or overly paranoid for not talking about it.

In addition, you should be aware that you give away a lot automatically on a regular basis. Facial recognition software nails you everywhere you walk around, and a constant stream of selfies into any social media will be sold to

... keep reading on reddit ➑

πŸ‘︎ 79
πŸ“°︎ r/SocialistRA
πŸ’¬︎
πŸ‘€︎ u/EtherealHire
πŸ“…︎ Jul 23 2020
🚨︎ report
OpenPGP pop ups unreadable in dark mode (macOS)

Using Thunderbird 78.6.0 on macOS Catalina (10.15.7), with macOS set to its dark mode.

With Thunderbird's built-in dark theme enabled, or the default theme, the UI is overall much easier on the eyes. However, clicking the OpenPGP button in signed/encrypted emails and then clicking either 'View signer key' or 'View your decryption key' results in an unreadable mess. Image here.

Only the light theme makes all elements readable, but it's unbearable on my eyes (due to disability). Any ideas please? Search didn't show much.

πŸ‘︎ 4
πŸ“°︎ r/Thunderbird
πŸ’¬︎
πŸ‘€︎ u/QGRr2t
πŸ“…︎ Jan 10 2021
🚨︎ report
My Comparison of Secure ProtonMail vs Tutanota : Tutanota has more free features and better cost but no compatibility with external OpenPGP and has been affected by DDOS attacks

https://preview.redd.it/0u8hsfyrfrn51.png?width=829&format=png&auto=webp&s=538dad32838d0ce6dad45922da3d263c28ddaf00

My more detailed comparison of features can be found at the link below (don't forget to open the notes attached to some cells). But what I can summarise very high level here are some of the key indicators that many may use to make a decision. They are both very secure and it is your own use case that may sway you one way or the other. Both companies have ZERO access to the content of your mail so if you forget your password and recovery codes, that's gone (which is as it should be). Both have mobile apps for iOS and Android from free tier.

Tutanota key points:* Double the free storage, as well as half the cost at the 10GB storage level. They claim compression could give more space.* It has an encrypted calendar in the free tier.* It has secure full text including content search.* Subject lines encrypted by default.* Both U2F and TOTP authentication.* Does not support OpenPGP (they say because the subject line is not encrypted and there is no support for Perfect Forward Secrecy).* Lot of recent availability issues due to DDOS attacks against them.* Has proper desktop apps for Windows, Linux and Mac to sync mail offline.

ProtonMail key points:* Does cost more. Free tier only 500MB storage.* Calendar only in paid tier.* Can only search addresses, date, subject line of mails. May be getting full search in future.* Thunderbird with Enigmail will send encrypted subject line mail to ProtonMail fine, but for sending from ProtonMail it does not encrypt the subject line....

See full details at CryptPad

#privacy #secureemail #protonmail #tutanota

πŸ‘︎ 3
πŸ“°︎ r/u_danievdm
πŸ’¬︎
πŸ‘€︎ u/danievdm
πŸ“…︎ Sep 17 2020
🚨︎ report
Cant create key

Im trying to generate a key and I don't think it will let me because my key is owned by root how can I fix this

[email protected] ~ % ls -al .gnupg

total 536

drwx------ 16 brian staff 512 Mar 31 13:59 .

drwxr-xr-x+ 20 brian staff 640 Mar 31 15:53 ..

srwx------ 1 brian staff 0 Mar 31 13:45 S.dirmngr

srwx------ 1 brian staff 0 Mar 31 13:59 S.gpg-agent

srwx------ 1 brian staff 0 Mar 31 13:59 S.gpg-agent.browser

srwx------ 1 brian staff 0 Mar 31 13:59 S.gpg-agent.extra

srwx------ 1 brian staff 0 Mar 31 13:59 S.gpg-agent.ssh

drwx------ 3 brian staff 96 Mar 31 10:08 crls.d

-rw------- 1 brian staff 34 Mar 13 00:12 dirmngr.conf

-rw------- 1 brian staff 41 Mar 13 00:12 gpg-agent.conf

[email protected] 1 brian staff 87 Mar 24 14:37 gpg.conf

drwx------ 9 brian staff 288 Mar 31 13:21 openpgp-revocs.d

drwx------ 10 brian staff 320 Mar 31 15:11 private-keys-v1.d

-rw-r--r-- 1 root staff 2495 Mar 31 13:35 pubring.kbx

-rw-r--r-- 1 brian staff 253353 Mar 31 13:21 pubring.kbx~

-rw------- 1 brian staff 1760 Mar 31 13:21 trustdb.gpg

[email protected] ~ %

πŸ‘︎ 2
πŸ“°︎ r/GnuPG
πŸ’¬︎
πŸ‘€︎ u/Weird-Patience
πŸ“…︎ Mar 31 2020
🚨︎ report
Configuring Linux with Microsoft SQL Drivers

Hey folks,

I am a Windows user, but Microsoft, in an amusing twist of fate, has chosen to make certain features of their Azure platform only available on Linux. This has put me, a DBA dabbling in DevOps and development, in the awkward position of trying to get some Linux VM's configured correctly through Microsoft's increasingly complex line of devops products, and I've hit a wall that I THINK I can get over with a little Linux help.

Here's the set of commands I'm trying to run, per Microsoft:

sudo su root curl https://packages.microsoft.com/keys/microsoft.asc | sudo su root apt-key add -

sudo su root curl https://packages.microsoft.com/config/ubuntu/16.04/prod.list > /etc/apt/sources.list.d/mssql-release.list

exit

sudo su root apt-get update

sudo su root ACCEPT_EULA=Y apt-get install msodbcsql17

Here's the error that I'm hitting:

2018-12-26T15:54:25.2968666Z ##[section]Starting: Installing Microsoft SQL Drivers

2018-12-26T15:54:25.2972112Z ==============================================================================

2018-12-26T15:54:25.2972196Z Task : Command Line

2018-12-26T15:54:25.2972296Z Description : Run a command line script using cmd.exe on Windows and bash on macOS and Linux.

2018-12-26T15:54:25.2972375Z Version : 2.142.2

2018-12-26T15:54:25.2972424Z Author : Microsoft Corporation

2018-12-26T15:54:25.2972909Z Help : [More Information](https://go.microsoft.com/fwlink/?LinkID=613735)

2018-12-26T15:54:25.2972991Z ==============================================================================

2018-12-26T15:54:25.4367244Z Generating script.

2018-12-26T15:54:25.4452350Z [command]/bin/bash --noprofile --norc /home/vsts/work/_temp/3ee298b1-8237-4114-9933-71bf2b8d1d45.sh

2018-12-26T15:54:25.7862862Z /usr/bin/curl: /usr/bin/curl: cannot execute binary file

2018-12-26T15:54:26.2197792Z gpg: no valid OpenPGP data found.

2018-12-26T15:54:26.2253947Z /home/vsts/work/_temp/3ee298b1-8237-4114-9933-71bf2b8d1d45.sh: line 2: /etc/apt/sources.list.d/mssql-release.list: Permission denied

2018-12-26T15:54:26.2449820Z ##[error]Bash exited with code '1'.

`2018-12-26T15:54:26.2463283Z ##[section

... keep reading on reddit ➑

πŸ‘︎ 16
πŸ“°︎ r/linuxquestions
πŸ’¬︎
πŸ‘€︎ u/Old13oy
πŸ“…︎ Dec 26 2018
🚨︎ report
GPG Issue

Hi Community,

I am trying to get Replicant on my Samsung Galaxy Nexus but I keep getting stuck at adding Replicant release key to my GPG keyring. I am getting this issue on both Macbook and Ubuntu:

Adams-MacBook-Air:Desktop adam$ gpg2 --armor --import /Users/adam/Desktop/recovery-maguro.asc

gpg: no valid OpenPGP data found.

gpg: Total number processed: 0

Is there anything I can do? Thanks.

πŸ‘︎ 3
πŸ“°︎ r/ReplicantOS
πŸ’¬︎
πŸ‘€︎ u/adam0000345
πŸ“…︎ Jun 28 2019
🚨︎ report
My Keybase proof [reddit:E440QF = keybase:e440qf] (OHQfKuW-jEiRrJ01zBm_-qNfSwz6mXF7zkp4CjeG6rg)

Keybase proof

I am:

Proof:

-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.1.3
Comment: https://keybase.io/crypto
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=mcA1
-----END PGP MESSAGE-----
πŸ‘︎ 2
πŸ“°︎ r/KeybaseProofs
πŸ’¬︎
πŸ‘€︎ u/E440QF
πŸ“…︎ Aug 06 2019
🚨︎ report
Blinded bearer certificates

A while ago I wrote a post about quickly scaling via federated sidechains, which generated a lot of good discussion. Now I'd like to bring people up-to-speed on another semi-centralized solution to scaling quickly, and this one also solves anonymity. It's called blinded bearer certificates. This is an idea well-known by Bitcoin experts, based on a paper by David Chaum written in 1983. Because all of the experts are familiar with the idea and are not terribly interested in it on an intellectual level, it is not discussed much. But people who don't study this stuff probably won't know about it, and it could be very usefully applied to Bitcoin.

As applied to Bitcoin, it would work like this:

  • N people who are independent and widely considered trustworthy come together to create a multisig address. You need 80% (or whatever) of the N people to agree in order to send money secured by the multisig address. This multisig group is called "the bank", though it ideally should not actually be a single monolithic organization, but rather a more decentralized selection of independent entities.
  • People interested in using the system (or, more likely, people interested in acting as market makers) will send x satoshi to the bank's multisig address and receive x signed certificates, one certificate per satoshi. Each certificate is signed by the bank (ie. because the bank is a multisig arrangement, each certificate will have multiple signatures); however, the signing is done using a technique called blind signing, which makes it so that although anyone can see that the certificate was signed by the bank, the bank will not in the future know when it signed which certificate. In other words, when the bank sees a signed certificate in the future, the bank will only know that the certificate is any one of the currently-unspent certificates, not which one it is.
  • People with the initial certificates can now send them to others. Simply giving someone the signed certificate is all the sender needs to do to transfer it. (Therefore, transacting over a secure channel is important.) The recipient has to then do some work in order to prevent the sender from double-spending: the sender gives all of the received certificates to the bank, creates new certificates, and has the bank blind-sign all of those new certificates. The
... keep reading on reddit ➑

πŸ‘︎ 19
πŸ“°︎ r/Bitcoin
πŸ’¬︎
πŸ‘€︎ u/theymos
πŸ“…︎ Dec 28 2016
🚨︎ report
Anyone on macOS and willing to test something for me?

We're working on getting some Namecoin-related patches merged upstream to Tor Browser (see this Namecoin news post and this Tor ticket for details), and I need someone to test whether the patches work properly on macOS.

You can download binaries here. Source code is here.

The main thing I need tested is whether the certutil binary works properly on macOS. As a basic test, you can run ./certutil -H from a terminal and it should show a bunch of help text. As a more thorough test, you can run ./certutil -L -d sql:$DIR where $DIR is your Firefox profile directory (the directory that contains cert9.db), and it should show a list of certificates. If it errors on either of those tests instead (e.g. errors about missing libraries), or simply doesn't do anything at all, let me know.

Here's an OpenPGP signature for the binaries. (The source code is also OpenPGP-signed via Git.) Make sure you verify the signature (unless you want to join an NSA botnet)!

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

a1e966b5f39cb6f92999273da355a458b3a5fb07fb9e4d59b3b5eb7fc9ed201f  mar-tools-mac64-certutil-2018-09-08.zip
-----BEGIN PGP SIGNATURE-----
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=HXV2
-----END PGP SIGNATURE-----

Cheers!

πŸ‘︎ 4
πŸ“°︎ r/Namecoin
πŸ’¬︎
πŸ‘€︎ u/biolizard89
πŸ“…︎ Sep 08 2018
🚨︎ report
Noob trying to verify Qubes OS download with GPG Tools on Mac OSX

Hello everyone,

As you may gather from the subject - I am trying to verify the current stable release of Qubes OS using GPG Tools (https://gpgtools.org/). I have never touched anything to do with this sort of thing ever but I have some experience in other areas of IT and I wish to learn about security and cryptography.

However I always, after about 5 attempts, end up with a failed verification and I don't know whether I am doing something wrong, or indeed I am doing something right and the download itself is actually dodgy. I was hoping someone here could help me through this, maybe point out what I am doing wrong or otherwise. Let me explain what I have tried:

Downloaded GPGSuite current stable version. Made sure my OS (Mac OSX) is up to date too.

Verified downloaded GPGSuite by using the SHA256 checksum method as mentioned here: https://gpgtools.tenderapp.com/kb/how-to/how-to-verify-the-download... - all checks out! Did the encrypted email tutorial in the docs and now have my own key in GPG Keychain.

Got Qubes Master Key, compared signatures to other sources throughout the web as recommended by Qubes themselves. Seems to be legit. Now it is within GPG Keychain. Also made sure I have OpenPGP tools within the right-click menu. Made the 'Validity' of the Master Key ultimate.

Downloaded Qubes OS 3 Release Signing Key, I also put this into GPG Keychain. Nothing is mentioned anywhere in any docs or any 'googleing' about verifying this key too which I find strange, but I continue.

Downloaded Qubes OS iso file (the one I want to verify!). Put in folder with both keys mentioned above. Right clicked on 'OpenPGP: Verify Signature of file' option. End up with 'Verfication: FAILED' message :-/

Try using Terminal instead of GUI (as talked about here: https://www.qubes-os.org/security/verifying-signatures/). End up with error message and not 'good signature' message as needed. Also tried putting Master Key, Release key and ISO file onto desktop and right clicked verified as seen in a youtube tutorial I saw.

Repeated above steps with no different results, cried. Googled 'How to verify Qubes OS using GPGSuite/Mac OSX' which didn't reveal much else than what I have already looked at. cried some more. Saw that there is lots of tutorials on how to install Qubes OS but all seem to gloss over the verifying part.

Is there anyone that can help me???? Have I missed some important step out? Is there a tutorial for this somewhere that I somehow missed in my googling? Did

... keep reading on reddit ➑

πŸ‘︎ 5
πŸ“°︎ r/Qubes
πŸ’¬︎
πŸ‘€︎ u/monkeyroboninja
πŸ“…︎ Jul 21 2017
🚨︎ report
RetroShare Feature List

Information directly from Team Retroshare DevBlog:

RetroShare Features:

  • public anon Chat rooms Distributed chat (a.k.a. Chat Lobbies)
  • private secure chat rooms (invitation only)
  • instant messaging like skype-icq-lync-etc
  • anon F2F file sharing => Turtle F2F Routing and RetroShare’s anonymous routing model
  • user-circle-based rights management: Browsable file sharing rights to circles. For example Browsable music directorys only to family, Browseable picture directory to only Friends, Browsable CC-media to all RS-Friends, non-browseable files as anon share to all friends and friends of friends.
  • anon forums -> if you create a forum, all your friends can subscribe to this forum. you can subscribe to a forum if a friend is subscribed. Team Retroshare about Forums Distribution
  • authenticated forums
  • authenticated private forums -> invitation only
  • channels to distribute stuff
  • .rscollection files like torrent files with hashes of the files and directory structure
  • .rscollection magnet links with the hash of the .rscollection file
  • swarming of downloads like Bittorrent
  • e-mailing from friend to friend (spam safe)
  • VOIP like Skype
  • openSSL encryption (TLS1.2 - PFS enabled - perfect forward secrecy)
  • openPGP authentication secured openSSL
  • Secured & encrypted chat and mail with others (non-friends) routed through the RetroShare Network -> Distant Chat and Distant Mail

HowTo test RetroShare

  • Have a try and start with the Portable Edition for Windows, all necessary Files in one directory without setup.exe and installation into your OS.
  • a lot of Packages exists f
... keep reading on reddit ➑

πŸ‘︎ 19
πŸ“°︎ r/retroshare
πŸ’¬︎
πŸ‘€︎ u/cavebeat
πŸ“…︎ Feb 20 2013
🚨︎ report
Cannot verify Tails 2.6 using OpenPGP on macOS Sierra

I used the Firefox Tails Download and Verify extension to download Tails 2.6 and verify the resulting ISO image. Everything passed. Wanting to be extra careful, I tried to verify the ISO using OpenPGP using both the mac instructions and the command line instructions but had concerning results.

macOS GUI

macOS version 10.12 (Sierra), GPG Suite 2016.08 installed

  1. I downloaded the Tails 2.6 OpenPGP signature file and the Tails signing key into the same folder as the Tails ISO file.

  2. In Finder, I right-clicked the Tails signing key and selected Services > OpenPGP: Import Key from File. A window appeared and said Imported 'tails-signing.key'. (Blindly installing this key concerned me.)

  3. In Finder, I right-clicked the Tails ISO and selected Services > OpenPGP: Verify Signature of File. A window appeared with the result:

    > Signed by: Tails developers (offline long-term identity key) <[email protected]> (752A3DB6) – undefined trust

  4. I restarted my machine, repeated all of these steps, and got the same result.

I found no documentation about what to do in this instance. Researching, I found the GPGTools Ownertrust explanation page, which says

> Undefined: has the same meaning as 'Unknown' but differs, since it has actually been set by the user. That could mean, that this is a key you want to process at a later point in time.

I was already concerned that I couldn't trust the Tails signing key. Now, I'm being told the key isn't processed (verified?)!

Command Line

macOS Terminal Version 2.7 (377), GPG Suite 2016.08 installed

From the directory containing the files, I typed

gpg --keyid-format 0xlong --verify tails-i386-2.6.iso.sig tails-i386-2.6.iso

The output was

gpg: Signature made Tue Sep 20 08:24:50 2016 PDT
gpg:                using RSA key 0x98FEC6BC752A3DB6
gpg: Good signature from "Tails developers (offline long-term identity key) &lt;[email protected]
... keep reading on reddit ➑

πŸ‘︎ 3
πŸ“°︎ r/tails
πŸ’¬︎
πŸ‘€︎ u/Paideuma
πŸ“…︎ Oct 06 2016
🚨︎ report
LibreOffice 5.4 Released

This is the best tl;dr I could make, original reduced by 80%. (I'm a bot)


> Berlin, July 28, 2017 - The Document Foundation announces LibreOffice 5.4, the last major release of the LibreOffice 5.x family, immediately available for Windows, macOS and Linux, and for the cloud.

> LibreOffice 5.4 adds significant new features in every module, including the usual large number of incremental improvements to Microsoft Office file compatibility.

> Thanks to the efforts of developers, the XML description of a new document written by LibreOffice is 50% smaller in the case of ODF, and around 90% smaller in the case of OOXML, in comparison with the same document generated by the leading proprietary office suite.

> LibreOffice 5.4 supports OpenPGP keys for signing ODF documents on Linux.

> LibreOffice 5.4 represents the bleeding edge in term of features for open source office suites, and as such is targeted at technology enthusiasts, early adopters and power users.

> Several companies sitting in TDF Advisory Board are providing either value added Long Term Supported versions of LibreOffice or consultancy services for migrations and training, based on best practices distilled by The Document Foundation.


Summary Source | FAQ | Feedback | Top keywords: LibreOffice^#1 Document^#2 Office^#3 file^#4 support^#5

Post found in /r/linux, /r/technology and /r/libreoffice.

NOTICE: This thread is for discussing the submission topic. Please do not discuss the concept of the autotldr bot here.

πŸ‘︎ 2
πŸ“°︎ r/autotldr
πŸ’¬︎
πŸ‘€︎ u/autotldr
πŸ“…︎ Jul 28 2017
🚨︎ report
How to set up email encryption: the idiot-proof edition

Originally published on gamezeit

&nbsp;

If you’re still on the fence about following a set of instructions and installing the necessary encryption software, consider the following two points: According to the Electronic Frontier Foundation, largest email providers (Yahoo!, Verizon, Comcast, AT&T, and Apple) don’t require search warrants to access email content. Secondly, every time you check your email using a mobile device, you’re letting the email provider know what your IP address is, and since IP addresses can be loosely tied to location, the provider will have clear map of where you are at all times of the day. Why should they be entitled to this?

&nbsp;

Fundamentally, there are multiple forms of email encryption with varying degrees of security; security level grows in tandem with the complexity of setup. But at the center, all email encryption relies on encrypting three things: the connection from the email provider, the email itself, and stored or archived emails from the past. Encryption can be achieved on the email provider’s server, using easy to install apps to encrypt/decrypt with a click of a button, or on the β€œend device” itself, your computer or mobile device. Encrypting on the provider’s server means the email’s contents are visible until the provider executes the encryption, whereas encrypting on the email on the end device ensures the content is unreadable before it’s even sent. For obvious reasons, the latter is a far more superior method.

&nbsp;

PGP email encryptionIn very short, simple terms, the encryption process works by jumbling up the contents of the message to make it look like gibberish to all but the holder of the decryption key (password) β€” essentially, a password that extracts the true meaning from the noise.

&nbsp;

The current best standard in email encryption is OpenPGP, otherwise known as end-to-end encryption. Unlike the β€œend-to-email-provider” method reliant on maintaining a confidential private key with all email recipients, OpenPGP uses two keys, one public and one private. As result, there’s no need to worry about securely distributing keys, as the public key is used to encrypt and the private β€” which you alone hold β€” to decrypt. The process can be summarized below:

&nbsp;

  1. The user wishing to send you an email encrypts it using your public key. This key can be either freely provide
... keep reading on reddit ➑

πŸ‘︎ 21
πŸ“°︎ r/howto
πŸ’¬︎
πŸ‘€︎ u/kabugii
πŸ“…︎ Feb 20 2015
🚨︎ report
Pirate Party meets RetroShare - Decentralized and Secure (full encrypted) Communication and FileSharing Platform - http://pir.at/retrochat

Arrrrr and Ahoi to all Pirates out there.

Have you ever heard of RetroShare?

New Chatserver now hosted by Pirate Party Austria http://retrochat.piratenpartei.at/w2c/howto.html

WebPresence on SF

http://retroshare.sourceforge.net/

DevBlog with in Detail Explanation of Functions and Security Model and Encryption

http://retroshareteam.wordpress.com/2012/10/26/ideals-behind-retroshare/

Featured on PrismBreak

Retroshare’s philosophy: decentralization and privacy

Retroshare is all about sharing and communicating with trusted Friends. This is the core design of Retroshare: a decentralised Friend-2-Friend network, which allows you to share stuff … not with the whole world… but with people you know and trust.

Privacy Retroshare creates direct SSL secured connections with your friends. This ensures that you conversations are private and cannot be eavesdropped on. The decentralised design ensures that there is no central server or single company that has access to all the data.

Some people like to call Retroshare a β€œDarkNet”. The similarities are a result of the Friend-2-Friend design rather than a deliberate aim. Actually, it is essential for Retroshare to use strong identities to authenticate your friends. We don’t hide Retroshare’s existence, but instead focus on keeping communication private and and only sharing information with your friends.

RetroShare on Wikipedia

http://en.wikipedia.org/wiki/RetroShare

Features

  • Search for friends
  • Search for files
  • Instant messaging
  • Groupchat (private and secure)
  • distant chat
  • IRC-like channels
  • Anonymous/authenticated forums
  • Multi-hop search for files
  • NAT hole punching
  • Swarming as in BitTorrent
  • Qt4 platform independent UI
  • Localisation for 9 languages
  • Anonymous file sharing with friends
  • set permissions to friends
  • set permissions circle based
  • URL scheme for shared files
  • Completely decentralised
  • Optional IP localization using Kademlia DHT
  • UPnP / NAT-PMP port forwarding support
  • Overview of all shared files
  • Multiple simultaneous downloads / uploads
  • Plugin support
  • Voice chat via VoIP plugin
  • Integration into the taskbar
  • Support for resuming downloads after exiting the program
  • Adding downloads via website links similar to Magnet Torrent Links
  • Public or anonymous data sharing with friends
  • development since 2006 (this is a long runner)
  • GPL License and full openSource
  • all traffic is openSSL encrypted and strong openPGP authenticated
... keep reading on reddit ➑

πŸ‘︎ 16
πŸ“°︎ r/PirateParty
πŸ’¬︎
πŸ‘€︎ u/cavebeat
πŸ“…︎ Jul 18 2013
🚨︎ report
My Keybase proof [reddit:doomtop = keybase:doomtop] (Qcw2j6GMYJ7dXUf3xTHu1EfArxEpjv1q7yuoGcnMJl8)

Keybase proof

I hereby claim:

  • I am doomtop on reddit.
  • I am doomtop on keybase.
  • I have a public key whose fingerprint is CEF3 7B34 915E FA71 828E 4837 51B8 DE16 E3BF 6FC0

To claim this, I am signing this object:

{
    "body": {
        "key": {
            "eldest_kid": "0101e6e6ee9d5d3fed5ec2af20674cfe12283dc848a9c31b5c442c83de510b100dc90a",
            "fingerprint": "cef37b34915efa71828e483751b8de16e3bf6fc0",
            "host": "keybase.io",
            "key_id": "51b8de16e3bf6fc0",
            "kid": "0101e6e6ee9d5d3fed5ec2af20674cfe12283dc848a9c31b5c442c83de510b100dc90a",
            "uid": "63fa4059380d2596dc6fcb31665ef519",
            "username": "doomtop"
        },
        "service": {
            "name": "reddit",
            "username": "doomtop"
        },
        "type": "web_service_binding",
        "version": 1
    },
    "ctime": 1472837202,
    "expire_in": 157680000,
    "prev": "f1cf74ac769895562a735821e4709e5885e522e408d623b592b10bbe09591755",
    "seqno": 14,
    "tag": "signature"
}

with the key from above, yielding:

-----BEGIN PGP MESSAGE-----
Version: Keybase OpenPGP v2.0.56
Comment: https://keybase.io/crypto
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=4UMx
-----END PGP MESSAGE-----

Finally, I am proving my reddit account by post

... keep reading on reddit ➑

πŸ‘︎ 2
πŸ“°︎ r/KeybaseProofs
πŸ’¬︎
πŸ‘€︎ u/doomtop
πŸ“…︎ Sep 02 2016
🚨︎ report
Working with PGP

Hello, I just saw the guide for noobs so I decided to cover a bit more advanced topic which a lot of people struggle with - Working with PGP.

Downloads

Windows: gpg4win

Mac: GPG Suite (this came up after just a bit of googling, I don't use Mac personally)

Linux: gnupg or gnupg2 (shown bellow)

Installing on Linux

I'll be using Linux in this guide and I'll show you how to work with keys through the terminal. There are graphic tools as well (Kleopatra for example, which comes with gpg4win).

Debian: sudo apt install gnupg2

Fedora: sudo dnf install gnupg2

Arch: sudo pacman -S gnupg

Generating a key

Use gpg2 --full-generate-key to generate a key and you should see something similar to the output bellow.

gpg (GnuPG) 2.2.19; Copyright (C) 2019 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
  (14) Existing key from card
Your selection?

As I don't want to get this too advanced we'll go with the defaults. Choose 1 or press Enter (as 1 is already default option) to continue.

Next, the program will ask you for your desired key size.

RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (3072)

The default 3072 but we'll go with 4096 since the longer the key is the harder it is to replicate (not like we can easily replicate 3072 bit keys).

The program will now ask if you want this key to expire.

Please specify how long the key should be valid.
         0 = key does not expire
      &lt;n&gt;  = key expires in n days
      &lt;n&gt;w = key expires in n weeks
      &lt;n&gt;m = key expires in n months
      &lt;n&gt;y = key expires in n years
Key is valid for? (0)

We'll choose 0 as we don't want this key to expire, there may be some scenarios where you just need this key temporarily but since this key can be used for 2FA we certainly don't want this one to expire. Choose 0 or just press Enter since 0 is already selected by default.

Press y when it asks you for confirmation.

It will not ask you to setup your user-id.

GnuPG needs to construct a user ID to identify your key.
... keep reading on reddit ➑

πŸ‘︎ 3
πŸ“°︎ r/darknet
πŸ’¬︎
πŸ‘€︎ u/vert3xo
πŸ“…︎ Oct 26 2020
🚨︎ report
Circumventing censorship of Tor – Guide

I wrote a little guide on how to circumvent censorship of Tor.
A censor can block access to Tor at two points: They can block you from getting the software Tor in the first place and they can block your connection to the Tor network. I've summed up ways to circumvent both beginning with alternative ways to get Tor.

#Getting Tor when torproject.org is blocked
If you cannot download Tor from the official website, you can try to use one of the following mirrors:

  • https://tor.eff.org
  • https://tor.ccc.de
  • https://tor.calyxinstitute.org
  • https://tor.eprci.net
  • https://torproject.urown.net
  • https://tor.nuclear-weapons.net
  • https://tormirror.tb-itf-tor.de
  • https://tor.stalkr.net
  • https://alliumcepa.wardsback.org
  • https://tormirror.snydernet.net
  • https://torproject.lu
  • https://torproject.ph3x.at
  • https://torproject.ip-connect.vn.ua
  • https://tor.ybti.net
  • https://tor.0x3d.lu
  • https://tor.zilog.es

You can also get the Tor Browser from the following sources:

  • https://github.com/TheTorProject/gettorbrowser/releases
  • https://archive.org/details/@gettor
  • https://drive.google.com/drive/folders/13CADQTsCwrGsIID09YQbNz2DfRMUoxUU

The file names consist of "tor-browser", the version, the platform and the language. For example the English release for version 9.0.4 on Windows 64 bit will be named torbrowser-install-win64-9.0.4_en-US.exe or similar.

If that does not work, send an email to [email protected] and write your operating system (such as Windows, macOS, or Linux) and your country code if you need a language other than English in the body of the message. You will receive an email with links and instructions for downloading Tor.

You could now proceed to install Tor, however verifying your download first will give you an extra level of security by making sure that your download is safe and has not been altered. I wrote a short guide on that for Windows and GNU/Linux on the end of the post.

#Connecting to the Tor network when it is blocked If you have Tor installed but you cannot connect to the Tor network due to censorship, you should use bridges. Instead of connecting directly to public Tor relays which are easy to block you can use a bridge as an unlisted and unpublished entry point. Just like a secret door.
To use bridges select "Configure" and then "Tor is censored in my country" when starting the Tor Browser.
You can now try to use the bridges built into Tor Browser.
Only use the meek-azure bridge whe

... keep reading on reddit ➑

πŸ‘︎ 89
πŸ“°︎ r/TOR
πŸ’¬︎
πŸ‘€︎ u/AgainstTheAgainst
πŸ“…︎ Apr 26 2020
🚨︎ report
META: r/YubiKey Frequently Asked Questions (PLEASE READ FIRST)

Yes I'm still working on the bigger wiki ;)

General FAQ

What is a YubiKey?

It's a physical token used to provide strong authentication for a multitude of things. Comes in USB-A and USB-C form factors, some designed to stay in your computer, some designed to be on your keychain.

How do I use it?

At a high level? Insert the YubiKey and press the button when the service tells you to.Unfortunately the specifics depend entirely on the service. The best user experience comes with websites and services that support FIDO U2F (more on this later) like Google, Facebook and Twitter.

Here's my use case.
My Facebook, Google, Github logins all use FIDO.Password managers KeePassXC and Dashlane use Challenge/Response and FIDO, respectively.I sign my code with my YubiKey, and I log into my homelab (SSH) and my VPN with the smart card functionality.

What happens if I lose the YubiKey?

Treat these things like your house keys or your car keys and have a backup if you can. You can register more than one YubiKey with most services.

If you can't afford two, make sure you have a way to get back into your email as you typically use it to recover most online services. For example, Google supports the use of backup codes (literally just one time use codes that you can print out and store somewhere). A YubiKey and a shortlist of backup codes is better than getting locked out of your accounts.

How do I make it stop emitting "cccjgjgkhcbbirdrfdnlnghhfgrtnnlgedjlftrbdeut" everywhere?

Use the YubiKey Manager to swap OTP Slot 1 to Slot 2

Will it work on my Android/iOS device?

If you're using a native app (on Android or iOS) you rarely reauthenticate. In these instances, look into using an "App Password" when supported. An App Password is basically a one time use password issued by the service (like Google for example) specifically for these weird scenarios.

Now, if you have an Android device and a YubiKey 5 NFC or YubiKey NEO you'll definitely get the VIP treatment.
OpenPGP support for emails, FIDO support built into Android for logging into services on Google Chrome and One Time Password support all just by tapping the YubiKey to the back of the phone.

iOS fans, unfortunately Apple gives us the shaft as far as NFC is concerned. No ability to send data to

... keep reading on reddit ➑

πŸ‘︎ 61
πŸ“°︎ r/yubikey
πŸ’¬︎
πŸ‘€︎ u/SoCleanSoFresh
πŸ“…︎ Oct 02 2018
🚨︎ report
Importing keys into GPG

Hey folks,

Looking for a little help,

I have been sent a private key by a friend it looks like:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Ot9WgXtk/FVGRWWM6xIgK8zt+tK1ftHHnIWd1v5 n0qoW7PLojUJJoD4NOMgU74rRIV8qKvG9r4RdwFJ7g== =/Qcf 
-----END PGP PUBLIC KEY BLOCK-----
//obviously lots of the key removed for brevity.

It's my first time using GPG on Windows (usually use OpenSSL on a Mac). I'm just trying to import the key, or better yet, simply use it to encrypt a data string.

But when I use the command:

gpg --import key.gpg

I see the message:

gpg: no valid OpenPGP data found.
gpg: Total number processed: 0

What am I missing here, does GPG not work with PGP keys? Am I being naive, do I also need to specify a cipher?

I was under the impression that GPG could be used with any Public Key to simply encrypt data. What am I doing wrong?

Thx, John

πŸ‘︎ 7
πŸ“°︎ r/crypto
πŸ’¬︎
πŸ‘€︎ u/john_alan
πŸ“…︎ Aug 08 2017
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.