![]() We’re going to start from the assumption that you’ve installed all the software and have generated a GnuPG key. Part two spent time installing and configuring GPGMail. If you need a refresher on GnuPG, or want more detailed guides on installation, part one of these columns covered what public-key cryptography is and how to get MacGPG. You’ll also want to go ahead and install GPGMail, a plugin that works with Apple’s Mail.app and provides a means to sign and encrypt e-mail messages. First, you’ll want to install MacGPG from the MacGPG site, including the files labeled “GNU Privacy Guard” and “GPG Keychain Access.” You’ll need a few things installed to follow along. This week, we’re going to delve into managing your GnuPG keys … the foundation of its security. Over the past few editions of Networking Notes, we’ve covered the installation and configuration of GnuPG, a Free Software implementation of Pretty Good Privacy, a public-key cryptography protocol you can use to secure your mail and text. We conclude our look at using public-key cryptography to secure your mail and text by delving into managing your GnuPG keys - the foundation of its security.
0 Comments
Leave a Reply. |