Tags: PGP

People Are Freaking Out That PGP Is ‘Broken’—But You Shouldn’t Be Using It Anyway

Hackers that can intercept your encrypted emails, or steal your emails from your computer or a server, may be able to decrypt them taking advantage of new vulnerabilities found in the way some email clients treat HTML. On Monday, the world was reminded once again that the almost 30-year-old...
Read 0 Comments

Using the Command Line to Decrypt a Message on Linux

If you have disabled the PGP plugin from your mail client and saved a copy of an encrypted email to your desktop, this guide will help you read that message in as safe a way as possible given what we know about the vulnerability described by EFAIL. Note that the first three steps (opening the...
Read 1 Comments

penguin_key.jpg

Linux kernel
The Linux Foundation will provide Linux maintainers with a free digital token to help improve the security of their PGP keys. Learn more.

Nitrokey Digital Tokens for Linux Kernel Developers

The Linux Foundation IT team has been working to improve the code integrity of git repositories hosted at kernel.org by promoting the use of PGP-signed git tags and commits. Doing so allows anyone to easily verify that git repositories have not been altered or tampered with no matter from which...
Read 0 Comments

online-pgp.jpg

online security
In this final installment of our PGP series, we show how to protect your online accounts with 2-factor authentication.

Protecting Code Integrity with PGP — Part 7: Protecting Online Accounts

So far in this tutorial series, we've provided practical guidelines for using PGP, including basic concepts and steps for generating and protecting your keys.  If you missed the previous articles, you can catch up below. In this final article, we offer additional guidance for protecting your online...
Read 0 Comments

global-network.jpg

PGP
We continue our series on practical PGP with a look at signed tags and signed commits, which help verify that your repository has not been tampered with.

Protecting Code Integrity with PGP — Part 6: Using PGP with Git

In this tutorial series, we're providing practical guidelines for using PGP, including basic concepts and generating and protecting your keys.  If you missed the previous articles, you can catch up below. In this article, we look at Git's integration with PGP, starting with signed tags, then...
Read 1 Comments

pgp-keys.jpg

PGP
In this ongoing tutorial series, Konstantin Ryabitsev offers best practices for using PGP and securing your privacy keys.

Protecting Code Integrity with PGP — Part 5: Moving Subkeys to a Hardware Device

In this tutorial series, we're providing practical guidelines for using PGP.  If you missed the previous article, you can catch up with the links below. But, in this article, we'll continue our discussion about securing your keys and look at some tips for moving your subkeys to a specialized...
Read 0 Comments

industry-1920.jpg

PGP
It would be very damaging for any developer to have their PGP keys stolen; learn how to keep yours secure.

Protecting Code Integrity with PGP — Part 4: Moving Your Master Key to Offline Storage

In this tutorial series, we're providing practical guidelines for using PGP. You can catch up on previous articles here: Part 1: Basic Concepts and Tools Part 2: Generating Your Master Key Part 3: Generating PGP Subkeys Here in part 4, we continue the series with a look at how and why to move your...
Read 0 Comments

binary.jpg

PGP
In this third installment of our PGP series, we'll explain how to generate PGP subkeys for day-to-day work.

Protecting Code Integrity with PGP — Part 3: Generating PGP Subkeys

In this tutorial series, we're providing practical guidelines for using PGP. Previously, we provided an introduction to basic tools and concepts, and we showed how to generate and protect your master PGP key. In this third article, we'll explain how to generate PGP subkeys, which are used in daily...
Read 0 Comments

binary-1538717_1920.png

PGP
Learn how to generate a 4096-bit RSA master key in this PGP tutorial.

Protecting Code Integrity with PGP — Part 2: Generating Your Master Key

In this article series, we're taking an in-depth look at using PGP and provide practical guidelines for developers working on free software projects. In the previous article, we provided an introduction to basic tools and concepts. In this installment, we show how to generate and protect your...
Read 3 Comments

pgp-security.jpg

PGP
If you write code that goes into public source repositories, you can benefit from the practical PGP guidelines provided in this series.

Protecting Code Integrity with PGP — Part 1: Basic Concepts and Tools

In this article series, we take an in-depth look at using PGP to ensure the integrity of software. These articles will provide practical guidelines aimed at developers working on free software projects and will cover the following topics: PGP basics and best practices How to use PGP with Git...
Read 0 Comments

Pages

Click Here!