BLOGROLLS

Using gpg

By: Simon Quantrill On: Tue 13 January 2015
In: Unknown
Tags:

GPG is used to perform encryption and signing of email and data. here are a few tips if you use gpg.

  • Create NEW gpg key

gpg --gen-key - Create a revocation certificate

gpg --output revoke.asc --gen-revoke - Listing keys ǐ

gpg --list-keys - Get keys from server

gpg --keyserver keyserver.argoss.nl --recv-key - Send keys to server

gpg --keyserver keyserver.argoss.nl --send-key - Encrypt Document

gpg --output doc.gpg --encrypt --recipient sander.hulst@bmtargoss.com doc - Decrypt Document

gpg --output doc --decrypt doc.gpg - ClearSign Document

gpg --clearsign doc - Detached Signature

gpg --output doc.sig --detach-sig doc - Verfiy Detached doc

gpg --verify doc.sig doc - Edit your own key

gpg --edit-key @bmtargoss.com - Search for keys

gpg --keyserver keyserver.argoss.nl --search-keys bmtargoss.com - Retrieve keys

gpg --keyserver keyserver.argoss.nl --recv-keys Sending a binary over email: Before sending:

gpg --enarmour < > .asc After Recieving:

gpg --dearmor < .asc > file.bin > Really cool way to tar and encrypt at the same time: $ tar -cf - | gpg -c > encrypted_archived_files.tgp And to get them back gpg < encrypted_archived_files.tgp | tar -xvf - The Rest you can find here: External Link


If you found the article helpful, please share or cite the article, and spread the word:


For any feedback or corrections, please write in to: Simon Quantrill