Send me an encrypted email
Follow the steps below.
My public keyDownload my public key
OS XHow to: Use PGP for Mac OS X
LinuxHow to: Use PGP for Linux
WindowsHow to: Use PGP for Windows
Verify my public key
Public keys can be created by anyone. It's important to verify the public
key you're using to send me an email is the public key owned by me.
A way to verify this public key belongs to me is to check this fingerprint against the public key you downloaded and my personal gmail address.
62A6 BC9C 8446 054A 3D3E 985E 89C4 73D2 322F 20CB
Once you have installed GPG on your machine, run the following to verify the fingerprint of my public key (replace myname below with my firstnamesurname first).
gpg --fingerprint email@example.com
This shows the fingerprint of my public key. If the fingerprint matches, it's my key.
pub 4096R/322F20CB 2015-06-02 [expires: 2019-06-02] Key fingerprint = 62A6 BC9C 8446 054A 3D3E 985E 89C4 73D2 322F 20CB uid [ultimate] Nathan Kowald <firstname.lastname@example.org> sub 4096R/EBC4D1C7 2015-06-02 [expires: 2019-06-02]
Send me an encryped email
You are all setup to send and receive encrypted emails.
You have verified the fingerprint of my public key matches the fingerprint in this page.
You have imported my public key into your keychain.
You can now send me an encrypted email.
The email subject line won't be encrypted, so choose something innocuous, like "hey".
Freedom of the Press Foundation have create an easy to follow guide to encryption: https://freedom.press/encryption-works
A great introduction to email encryption: https://firstlook.org/theintercept/2014/10/28/smuggling-snowden-secrets/
Each person who wants to send or receive encrypted email needs to generate their own PGP key, called a keypair. PGP keypairs are split into two parts, the public key and the private key.
If you have someone's public key, you can do two things: encrypt messages that can only be decrypted with their private key, and verify signatures that were generated with their private key. It's safe to give your public key to anyone who wants it. The worst anyone can do with it is encrypt messages that only you can decrypt.
With your private key you can do two things: decrypt messages that were encrypted using your public key, and digitally sign messages. It's important to keep your private key secret. An attacker with your private key can decrypt messages intended only for you, and can forge messages on your behalf.
Passphrase is another name for password. The security of encryption often relies on the security of a password. Since passwords are very easily guessed by computers, it is important to set a strong password when setting up your keypairs.
Each PGP key has a unique fingerprint. A fingerprint is a short and more convenient way to uniquely represent a key.