

Imagine you have a plaintext file which contains a password, and you want to share this file with someone else across the internet (let’s say this someone is our friend “Bob”). When a file is said to be plaintext it simply means that it’s unencrypted, whereas a cipher is a noun that refers to a plaintext that has been encrypted. It’s important to know what these mean before moving on, so let’s clarify this now: Throughout this post you’ll see me use words like “plaintext” and “cipher”. It’s taken me longer than I care to admit to really understand the things I’ll be discussing here (and even then I’ll likely have missed a lot of important nuances), and with that said: what am I planning on covering in this post? Well that would be… Helping others to also understand the purposes of said tools.Solidify my own understanding of the tools I’ll be covering.Now the actual purpose of this post was twofold:

Note: although quite a tough read at times, I would highly recommend “Bulletproof SSL and TLS” written by Ivan Ristić If you’re working with applications and/or servers in production then please consult someone better equipped on the subject of security. I’m not even a security intermediate! When I titled this post “security basics” I wasn’t kidding. This post isn’t meant to be “this is how you do security”. Just skip until What is GPG? (in there are two sub sections about “OpenSSH”, “SSH Agent” and “OpenSSL”, just skip those until you get to the next “GPG” section and continue all the way from there) Introduction UPDATE: for those short on time, read the following Introduction, What are keys and how do they work? and then skip over the sections “Understanding PKI” and “OpenSSL vs OpenSSH” as these just go into more depth on the technical aspect of different encryption concepts.
#Use pgp key to encrypt attachments with gpg suite mac how to#
How to encrypt data using GPG, OpenSSL and Keybase.
