|
Authored by Feldegast on Sept 6, 2013 8:37:57 GMT
On Linux i use KDE so I used kgpg and gpg2 to generate my keypair you may need to change kgpg from gpg to gpg2 in its preferences if it is set to gpg I followed this guide to create my keypair help.ubuntu.com/community/GnuPrivacyGuardHowtoremember to: export GPGKEY=63B87BF2 Note when importing into kgpg on another computer I needed root access due to permissions in the kgpg directory for my user once the permissions on the files were set so i could access them, root was no longer needed Install Google Chrome if you do not already have it In Google Chrome install the extension Mailvelope 0.6.6 - Secure email with OpenPGP encryption for Webmail Import your public keys and your private key into Mailvelope Firefox firegpg discontinued - there is a possible replacement here but it is unconfirmed by me addons.mozilla.org/en-us/firefox/addon/webpg-firefox/Android install 2 apps: agp k9mail import your public and private keys into agp in k9mail set it to use agp Now you can send and receive encrypted email on Linux and Android!
|
|
celtichackr
Veteran Member
Hacker, geek, all around technoaddict. Amateur Scientist (well except for those pesky degrees).
Posts: 51
|
Authored by celtichackr on Sept 6, 2013 20:35:45 GMT
what is the significance to "63B87BF2"?
|
|
|
Authored by Feldegast on Sept 8, 2013 2:53:47 GMT
It is the identifier of the created key it will be different for each person (i used random letters as an example but they are that length for me at least). It is so applications know your preferred key in the event you have multiple secret keys created and stored in your secure keyring.
|
|
guest
Guest
|
Authored by guest on Sept 8, 2013 21:18:40 GMT
If you are looking for a way to send something really confidentional, you can use encryption together with steganography.
In an "innocent" JPEG photo or voice recording you can hide encrypted message.
Please check the "outguess" and "steghide" programms for Linux (probably there are more of them).
|
|
none
Guest
|
Authored by none on Sept 29, 2013 7:14:19 GMT
I too use KDE, and found on both Fedora 19 and Slackware two files 'missing' when attempting to seamlessly use gpg. KDE seems to have full support for nicely integrated use of gpg, but on both distributions, there seems to be a missing link when attempting to actually do that.
Do feel free to correct my misunderstandings...
The files included below are shell scripts. The indentation was lost in the cut & paste action, to this forum, so please forgive the obfuscated code, it is not intentional.
What these files do is that they start/stop the gpg-agent program for each user that logs in/out, and make sure that the communication socket of the agent is known to all programs for that user that want to access it. The scripts do this by setting, at an early stage in the start of KDE, an environment variable that points to the socket of gpg-agent for that user.
Without this -to name a thing- kleopatra will report errors when started, and is unable to manage/generate keys at all. Without this, kmail will not be able to encrypt/decrypt mails.
Adding these two files and logging out/in will remedy both these problems. With both files installed, you will still have to do 'the usual' such as actually generate keys, configure kmail to actually use them, but that all is well 'covered' in the manuals of the respective programs. The little trick mentioned here is not.
This to the best of my knowledge, feel free to enlighten me if i'm mistaken.
On Fedora, these files reside in /etc/kde/env/start-gpg-agent.sh and /etc/kde/shutdown/stop-gpg-agent.sh respectively, and are thus available/use to/by all users. On Slackware i've put them in ~/.kde/env/start-gpg-agent.sh and ~/.kde/shutdown/stop-gpg-agent.sh respectively, an they are present for the current user only.
Both installation locations seem to work well. I have yet to check out if Slackware even *has* a /etc/kde directory...
start of gpg-agent -----------------------------8<------------------------------------- #!/bin/sh GPG_AGENT=/usr/bin/gpg-agent ## Run gpg-agent only if not already running, and available if [ -x "${GPG_AGENT}" ] ; then
# check validity of GPG_SOCKET (in case of session crash) GPG_AGENT_INFO_FILE=${HOME}/.gpg-agent-info if [ -f "${GPG_AGENT_INFO_FILE}" ]; then GPG_AGENT_PID=`cat ${GPG_AGENT_INFO_FILE} | cut -f2 -d:` GPG_PID_NAME=`ps -p ${GPG_AGENT_PID} -o comm=` if [ ! "x${GPG_PID_NAME}" = "xgpg-agent" ]; then rm -f "${GPG_AGENT_INFO_FILE}" 2>&1 >/dev/null else GPG_SOCKET=`cat "${GPG_AGENT_INFO_FILE}" | cut -f1 -d: | cut -f2 -d=` if ! test -S "${GPG_SOCKET}" -a -O "${GPG_SOCKET}" ; then rm -f "${GPG_AGENT_INFO_FILE}" 2>&1 >/dev/null fi fi unset GPG_AGENT_PID GPG_SOCKET GPG_PID_NAME fi
if [ -f "${GPG_AGENT_INFO_FILE}" ]; then eval "$(cat \"${GPG_AGENT_INFO_FILE}\")" eval "$(cut -d= -f 1 < \"${GPG_AGENT_INFO_FILE}\" | xargs echo export)" export GPG_TTY=$(tty) else eval "$(${GPG_AGENT} -s --daemon --write-env-file ${GPG_OPTIONS})" fi
fi -----------------------------8<-------------------------------------
stop of gpg-agent -----------------------------8<------------------------------------- #!/bin/sh
## The nice way if test -n "${GPG_AGENT_INFO}"; then GPG_AGENT_PID=`echo ${GPG_AGENT_INFO} | cut -d: -f2` && kill ${GPG_AGENT_PID} ||: unset GPG_AGENT_INFO fi
## The not so nice way ## NOTE: a root login will kill *all* users' gpg-agents #killall gpg-agent
## clean/remove .gpg-agent-info rm -f $HOME/.gpg-agent-info -----------------------------8<-------------------------------------
|
|
|
Authored by wayneborean on Sept 30, 2013 1:46:40 GMT
On Linux you are probably safe. On Amdroid, well, I"d be careful. There is a test I can think of to check if Amdroid has been infected. 1) send the same messages using Andoird and Linux using the sme encryption key. See if the output is different, compare carefully (I am assuming use if compatible software on both ends. Wayne madhatter.ca
|
|