CLI for noobies: Sign this!

18

Author: Joe Barr

Security is everybody’s business. Even yours, you lackadaisical, GUI-dependent, louts! So read carefully and learn how you can improve your data security at the command line. In a previous column, we learned how to create the keys for GnuPG, the free software version of Phil Zimmerman’s Pretty Good Privacy. This week we’ll learn how to use those GnuPG keys to create and verify cryptographic signatures. So grab your Secret Decoder rings and hold on tight, Crypto Kiddies: here we go back to the land of personal cryptography!