Home
Search results “Cryptographic keys and keyrings in pgp desktop”
What is PGP/GPG Encryption? In 3 Minutes - PGP/GPG Tutorial for Beginners
 
03:04
Thanks for watching! I'd love it if you could support me by subscribing and sharing it with your friends. Thanks!
Views: 109183 Victor Dozal
How PGP Works
 
02:55
By the end of this lecture you will understand how PGP encryption works and how it keeps your communication over the Dark Web and Deep Web secure.
Views: 50050 Dark Web Academy
How To Use PGP/GPG Encryption - In 2 minutes - PGP /GPG Tutorial for Beginners
 
02:32
How To Use PGP Encryption - PGP for Beginners www.VictorDozal.com What is PGP? In 3 minutes https://www.youtube.com/watch?v=1-MPcUHhXoc Generating your PGP keys https://www.igolder.com/pgp/generate-key/ Encrypting a message https://www.igolder.com/PGP/encryption/ Decrypting a message https://www.igolder.com/PGP/decryption/ In this tutorial, I will teach you how to use PGP encryption, including how to get your own PGP keys, encrypt messages, and decrypt messages. If you don't know what PGP encryption is, go ahead and watch my other video "What is PGP encryption? In 3 minutes" https://www.youtube.com/watch?v=1-MPcUHhXoc The three steps needed to use PGP keys are: 1. Generate your PGP keys somehow. 2. Encrypt a message using a PGP public key. 3. Decrypt a message using a PGP private key. If this tutorial helped you in any way, please don’t forget to like the video and subscribe to my channel, as you will be helping me to create more useful tutorials.
Views: 75121 Victor Dozal
GPG Encryption Software Free for Mac
 
08:24
Get the Good and Geeky Book - Email Privacy and Security. - https://goodandgeeky.com/PrivacyUS SEND me an email - My Public key is below... http://goo.gl/ycKwa - Mac 20Q - Free file encryption software for Macs is available at gpgtools.org. It works really well and is easy too. GPGTools encrypt text selection and Setting up services - http://www.youtube.com/watch?v=QlNqjSzJor8 A newer video that might help - https://www.youtube.com/watch?v=iziHyMKc1BI Here is my public key = send me an email and I will send you an encrypted email in return. https://goodandgeeky.com/extra/A56033C1.asc Or go to https://goodandgeeky.com/gpg-public-key-send-email/ select and copy the public key text - Then add to your GPG Keyring Looking forward to hearing from you.
Views: 43899 David Allen
Beginners Pgp Encryption / How to use GPG Pretty Good Privacy
 
03:27
Get the Book - https://goodandgeeky.com/email-privacy-book-launched/ There is a free PGP Cheatsheet on the page too. PUBLIC KEY BELOW... How to set up Services on your Mac so that you can use GPG from a right click on selected text Watch this tutorial. https://www.youtube.com/watch?v=QlNqjSzJor8 In these days of PRISM and governments being found out for going through all of your emails and collecting all that data it is surely a good idea to encrypt your emails. Personally, very few of my emails contain any sensitive information, but I still don't see why the government's of the world should be able to read my mail. There is paid software that you can get for Pretty Good Privacy, but there is also a free version that you can use called OpenPGP or GPG. In this video I show you how to get started with OpenPGP. How to create a key pair in GPG to put into your GPG tools Keychain access application. In other videos I will be shown you how to use the public and private key so that you can encrypt your email that you sent to your family and friends and business colleagues. https://gpgtools.org/ You should remember that anything that you put onto the Internet is public and not private. For example I needed to send my birth certificate by email and I didn't want that to be in the public domain so I encrypt did the email I used to send that image. It is also possible to encrypt the file and to attach a file like that to the email that you send. These are bite sized videos showing you how to do specific tasks in OpenPGP. The videos are intended for beginners PGP encryption. ------------------------------------ Here is my public key = send me an email and I will send you an encrypted email in return. https://goodandgeeky.com/extra/A56033C1.asc Or go to https://goodandgeeky.com/gpg-public-key-send-email/ select and copy the public key text - Then add to your GPG Keyring Looking forward to hearing from you. ------------------------------- ## Please subscribe to make sure you hear about all the How To videos. You can subscribe here Wizardgold Channel - http://goo.gl/zE2Uc On the Wizardgold Channel you will also find playlists so that you can see all the videos for specific areas of interest. Here is the Playlist for NoStylus - http://goo.gl/WMf7s ## Let's get Social * Twitter - https://twitter.com/wizardgold * FaceBook - http://goo.gl/mz4Gd * GooglePlus - http://goo.gl/SKDeJ Here is the website for more about NoStylus - http://nostylus.com
Views: 27644 David Allen
John the Ripper: How to Recover Your PGP Private Key Password
 
03:22
Please check out my Udemy courses! Coupon code applied to following links.... Kali Linux Hands-on Penetration Testing Labs: https://www.udemy.com/kali-linux-hands-on-penetration-testing-labs/?couponCode=TENDOLLARS Network Security Analysis Using Wireshark, Snort, and SO: https://www.udemy.com/network-security-analysis-using-wireshark-snort-and-so/?couponCode=TENDOLLARS Snort Intrusion Detection, Rule Writing, and PCAP Analysis: https://www.udemy.com/snort-intrusion-detection-rule-writing-and-pcap-analysis/?couponCode=TENDOLLARS Description: This video will show you how to use dictionary and brute force password cracking methodology to recover PGP private key passwords. The tool which is used for this purpose is John the Ripper Bleeding Jumbo version on Kali Linux. The following URLs is where you can acquire JTR and the crackstation wordlist: https://github.com/magnumripper/JohnTheRipper https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm
Views: 7203 Jesse Kurrus
PGP Encryption Tutorial (using gpg4win and Kleopatra)
 
04:28
A short tutorial on how to use Kleopatra and gpg4win to encrypt messages using public PGP keys. Download gpg4win and Kleopatra here: http://www.gpg4win.org/ ** Also, an easier way instead of saving the persons public key as a GPG. Just have is saved to your clipboard and click on the system tray and click 'Certificate Import' and it does it all it's self :) (Harvey Crumpet)
Views: 170278 Kevin Cronly
PGP Encryption Tutorial for Newbies - GPA 0.9.6 based - EASY INSTRUCTIONS
 
09:09
If you liked, please, become a patron! Patreon: https://www.patreon.com/amazingace This is a tutorial about how to use PGP (pretty good privacy) with the progam GPA (best tool IMO for newbs). IF YOU HAVE ANY QUESTIONS PLEASE LEAVE IN THE COMMENTS BELOW! PayPal donations: [email protected] (pennies count)
Views: 69751 Darien Bargo
Exporting and Importing PGP Keys
 
03:33
This video shows you how to export and import a key using PGP.
Views: 11954 Dan Guilmette
Create a PGP Key
 
03:00
How to Create a PGP key on Ubuntu
Views: 21129 Pirate Linux
gpg4usb complete tutorial
 
12:50
Learn how to create an encryption key, encrypt, decrypt, sign, and verify messages all in an easy to understand visual tutorial. You can download gpg4usb here: http://www.gpg4usb.org/ After downloading the program, simply unzip the files and launch "Start_Windows" if you're on a windows computer and "Start_Linux" if you're using Linux. The Crypto Scriptorium allows authors the chance to publish their works anonymously without fear of retribution and still get paid for their time and efforts. For more information, please visit us at: http://cryptoscript.tumblr.com
Views: 19934 Crypto Scriptorium
Encrypt your e-mail, Setting up PGP on Thunderbird & Linux GPG CLI tutorial
 
47:57
In this video I will show you how to setup your Mozilla Thunderbird e-mail client to use PGP (Pretty Good Privacy) encryption, along with setting up your PGP keys, publishing them, test e-mails, how to encrypt regular files with PGP on both Windows and Linux, and go over how to use PGP on the Linux command line as well. https://www.gpg4win.org/ https://www.enigmail.net/ Well known Key Servers: http://pgp.mit.edu/ http://keyserver.ubuntu.com/ http://keyserver.pgp.com/ Cheat sheet, Linux commands: Encrypt file or e-mail: gpg -e -r [email protected] filename -e Tells gpg to encrypt a file with PGP -a (--armor) ASCII plaintext, used for e-mails -r Recipient, who you want to encrypt the file for, this can be for yourself or someone else Decrypt e-mail or file: gpg -d filename -d Tells gpg to decrypt the file, you must have the private key on said server's keyring to decrypt said file -o specify output file name, otherwise spit out the file in stdout. List public keys: gpg --list-keys List private keys: gpg --list-secret-keys Import public key: gpg --import key.asc Import private key: gpg --allow-secret-key-import --import Export public key: gpg -a --export [email protected] Export private key: gpg -a --export-secret-keys [email protected] Delete public key: gpg --delete-key [email protected] Delete private key: gpg --delete-secret-key [email protected] Questions? IRC: irc.gtaxl.net +6697 #GTAXLnet E-Mail: [email protected] (F5903927) PGP: http://pgp.mit.edu/pks/lookup?op=get&search=0xBA7C77A6F5903927
Views: 2014 TheN3tw0rq
How-To: Export Your PGP Public Key to Send to Others
 
04:00
In order to exchange encrypted email with other people, you must send them your public PGP key and they must send you theirs. This video shows you how to export your key to a format that is ready to send to others!
Views: 9557 Anthony Papillion
GnuPG Tutorial Part 3: Exchanging Keys
 
01:20
How to exchange public keys in GPG
Views: 15977 GnuGPTutorial
005.Backup der beiden PGP Keyrings (OSX)
 
00:49
Backup des Schlüsselpärchens anlegen
Views: 46 Dirk Kuepper
How to use public keys for encrypted  messages
 
01:52
This is done iwith Cryptophane7.0 Open Source Free Encryption Software Get it Here: http://code.google.com/p/cryptophane/downloads/list
Views: 481 Laura McCallum
How To Create Private and Public Keys Using GPG4win
 
06:43
This tutorial will show you how to create your private and public keys in GPG4win. For more tutorials, visit http://www.interpayroll.co.uk/blog
Views: 39622 interpayroll
GNUPG-Key Signing.mpeg
 
01:34
Signing a key GPG.
Views: 406 nitcgnupg
Claws Mail - Public PGP key selection
 
01:35
This is how Claws Mail chooses a public key to encrypt to when you write to a recipient for which you have the key: it chooses it by email address, asks you for verification if the trust isn't full, and lets you manually choose if no email matches in the public keyring.
Views: 1772 Colin Leroy
Black Hat USA 2003 - Keynote: Pretty Good Privacy
 
57:15
By: Philip R. Zimmermann
Views: 129 Black Hat
GPG Key Tutorial
 
02:49
How-TO: Create a Key Pair for use with Evolution Email
Views: 2283 boriddlin
APT Keyring File Problem Solved!
 
11:55
APT Keyring File Problem Solved! It turns out the the package software-properties-gtk causes the creation of a file named trusted.gpg in the /etc/apt/ directory that causes Debian Stretch problems. Debian Stretch uses the files located in /etc/apt/trusted.gpg.d/ to manage gpg keys for apt. The software-properties-gtk program creates another file named trusted.gpg in the /etc/apt/ directory which confuses apt. Solution: do not install software-properties-gtk
Views: 137 eznix
Keychain Access on Mac OS X - Tutorial and Introduction
 
07:24
A Keychain Access for Mac OS X tutorial and introduction. This video gives users an overview of what Keychain Access on Mac is and how to get started with using Keychain Access. Mac for Beginners Tutorial: https://www.youtube.com/watch?v=MN0FD8KW2V4 Published by Anson Alexander from http://AnsonAlex.com
Views: 163758 Anson Alexander
Signing with OpenPGP using Kleopatra
 
04:40
How to sign file or text with OpenPGP signature using Kleopatra
Views: 1093 Cryptonomica
E-mail Encryption for Beginners: Gpg4Win, Outlook Privacy Plugin, and Mailvelope
 
20:18
This tutorial explains how to install and use GnuPG for certificate (public / private key pair) management; the Outlook Privacy Plugin for working with encrypted e-mails in Microsoft Office Outlook; and Mailvelope for working with encrypted e-mails via web-based e-mail services such as Gmail or Yahoo! Mail. Links: -------- GnuPG for Windows: http://www.gpg4win.org/ Outlook Privacy Plugin: http://code.google.com/p/outlook-privacy-plugin/ Mailvelope: http://www.mailvelope.com/
Views: 33710 calraith
Encrypt a File
 
02:17
How to encrypt a file on Ubuntu
Views: 4643 Pirate Linux
Manually Remove "Your personal files are encrypted" by  Cryptowall/Cryptorbit/Cryptolocker & others
 
04:56
Remove Cryptorbit, Cryptolocker, Cryptowall & others manually. No software required. I show you how to remove Cryptorbit but its the same exact steps to remove Cryptolocker as well as other similar infections. Follow me step by step. Pause this video if you need to. We will go into the registry but i will go slowly so pay attention. -First thing to do is go into you control panel and uninstall anything to do with Crypt. Some of you will have something in there, others will not. -Next we restart computer into "safe mode". Once your your computer starts to reboot back up, keep pressing the F8 key to get it in safe mode. Once there highlight and click "safe mode". -Once your computer is booted up and in safe mode click on the start button and type in "regedit" - Now, follow this exact path.. Hkey_current_User--software--microsoft--windows--current version--run- now look for Cryptorbit, right click it and press delete. And click yes to the prompt asking if you are sure you want to delete it. - Now click on the Start menu then click on "Administrator", then Appdata--Roaming-- then find and delete Cryptorbit. - Restart your computer as normal. And there you go. Congrats to you, you just did actually what these free programs will do except for adding additional malware on your computer. Please sub and Like if this worked for you. Thank you! Cyyptorbit Your personal files are encrypted. All files including videos, photos and documents, etc. on computer are encrypted. Encryption was produced using a unique public key generated for this computer. To decrypt files, you need to obtain the private key. The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this windows. After that, nobody and never will be to restore files. File decryption cost ~ $50. (some will say $200) In order to decrypt the files, open site 4sfxctgp53imlvzk.onion.to/index.php and follow the instruction. If 4sfxctgp53imlvzk.onion.to is not opening, please following steps below: 1. You must download and install this browser: http://www.torproject.org/projects/torbrowser.html.en 2. After installation, run the browser and enter the address: 4sfxctgp53imlvzk.onion.to/index.php 3. Follow the instructions on the web-site. We remind you that the sooner you do, the more changes are left to recover the files. Guaranteed recovery is provided within 10 days. http://barnegat-manahawkin.patch.com/groups/police-and-fire/p/prosecutor-warns-of-latest-home-computer-virus Prosecutor Warn of Latest Computer Virus
Views: 194477 iLuvTrading
Ubuntuscreencasts-HhowToCreateAPGPKey732.m4v.mp4
 
06:23
This screencast walks you through making a PGP key using the default Ubuntu Application Seahorse. It also covers making a backup and a revocation certificate.
Views: 1007 ubuntuscreencasts
HOWTO: Import and Export Key Rings using GnuPG Shell
 
00:55
How to import and export key rings in GnuPG Shell. GnuPG Shell is a cross-platform GUI for the GNU Privacy Guard. Go to http://www.tech-faq.com/gnupg-shell.shtml to download GnuPG Shell.
Views: 1868 Will Spencer
GNUPG- GPA demonstration.mpeg
 
02:23
Demonstration of GUI for Gnupg
Views: 688 nitcgnupg
Total Arch Linux | 1.1 PGP Schlüssel Fehler
 
01:59
Wenn es zu einer Fehlermeldung wegen eines fehlenden Schlüssels kommt, dann hilft der Befehl "pacman -Sy archlinux-keyring" und die Installation kann fortgesetzt werden.
Views: 2217 unicks.eu
Howto (GPA) GNU Privacy Assistant - Signing a key and uploading it.
 
01:11
How to use the GNU Privacy Assistant: Getting a key from a keyserver NOTE: BEFORE signing make sure the key information matches what you expect.
Views: 5652 Michael Evans
Import Missing GPG Keys In Ubuntu By Charlie.
 
03:15
Join my Blog http://charlieswinlinux.blogspot.com/ Here are the Scripts sudo add-apt-repository ppa:nilarimogard/webupd8 sudo apt-get update sudo apt-get install launchpad-getkeys Then, to import all the missing GPG keys, run the following command: sudo launchpad-getkeys http://charlieslinux.blogspot.com/
Views: 711 Charlie Henson
Web of trust
 
10:27
In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure, which relies exclusively on a certificate authority. As with computer networks, there are many independent webs of trust, and any user can be a part of, and a link between, multiple webs. The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0: This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 597 Audiopedia
How Do I Tails?: A Beginner's Guide to Anonymous Computing
 
01:16:30
This talk serves as an introduction to The Amnesic Incognito Live System and anonymous computing. It covers why privacy is important, the various features of the operating system, and also touches on some basics of threat modeling and operational security. This talk was given at DEF CON 23 in the EFF's Crypto & Privacy Village. Due to limited village space, there were actually two presentations operating at the same time, hence the background noise. The microphone that I was using was pretty poor quality, and as such the audio isn't the best. I have taken the time to transcribe the audio to try and compensate for these problems, so try giving the captions a run. When the audio cuts out, it is due to someone speaking off screen and I removed the audio to protect their privacy. Since this presentation was given in August of 2015, there are portions that are now out of date or irrelevant. I will attempt to provide corrections and updates either in the description or annotations on the video itself. If you notice something that needs correction, send me a message and I'd be happy to tweak it. Big thanks to my buddy Kyle Hinckley, a.k.a. The Weirdist for his help in getting this project edited and rendered. He runs a channel showcasing strange builds in Bethesda games, so if that's your kind of thing check out his channel here: https://www.youtube.com/user/WeirdistBuilds Relevant links: Talk transcript: http://pastebin.com/4ZQXR7Vv Current Tails Installation Instructions: https://tails.boum.org/install/index.en.html Crypto Village site for handouts - https://cryptovillage.org/archives/dc23/ Tails - https://tails.boum.org/ Whonix - https://www.whonix.org/ Qubes OS - https://www.qubes-os.org/ Tor Project - https://www.torproject.org/ Electronic Frontier Foundation - https://www.eff.org/ Freedom of the Press Foundation - https://freedom.press/ Errata: 2016/01/13 - I was mistaken about the method that Tails uses for time synchronization. See more information here: https://tails.boum.org/contribute/design/Time_syncing/ 2016/01/15 - Added annotation for the Whonix page regarding Tor/VPN combinations: https://www.whonix.org/wiki/Tunnels/Introduction 2016/07/07 - Since I've been getting a lot of spam comments on here about VPNs, here's a brief snippet about them from the Whonix Wiki: "Improper combination of Tor and another service may decrease your security and anonymity.... almost all users of Whonix, using Tor alone – without a VPN or proxy – is the right choice."
Views: 117353 Forrest Barth
HOWTO: Install GnuPG Shell and Create a Key Ring
 
02:01
How to install GnuPG Shell and create a key ring. GnuPG Shell is a cross-platform GUI for the GNU Privacy Guard. Go to http://www.tech-faq.com/gnupg-shell.shtml to download GnuPG Shell.
Views: 5718 Will Spencer
HOW TO CREATE A NEW CONTACT AND IMPORT HIS HER PUBLIC KEY
 
01:21
In this tutorial video youll learn how to add new contacts in your n-Tegritys address book and add his/her public key. Then youll be able to send encrypted files/attachments to all your contacts. See http://ntrance-global.com Special thanks to http://www.safeclick.it (Italian representatives for Strong Authentication tools)
Views: 134 ntranceglobal
PGP avain - Ubuntu
 
02:15
Ennen kun pystyt käyttämään PGP-salausta, tarvitset avaimen sitä varten. Videolla opastetaan ubuntun PGP-avaimen luominen.
Views: 276 ThePyora
Volatility 2.4 at Blackhat Arsenal "Mac OS X User Activity"
 
07:14
This video shows how to analyze physical memory of a Mac OS X 10.9 (Mavericks) system to recover OTR chats; PGP Mail messages; Calendar, Contact, and Notes entries; and how to decrypt the Keychain Access database. For more information on Volatility or memory forensics in general, see: http://volatilityfoundation.org https://github.com/volatilityfoundation http://www.memoryanalysis.net http://volatility-labs.blogspot.com Text to speech narration: This demo shows how to track Mac OS X user activity by examining artifacts in physical memory with Volatility. First, you’ll see the suspect, Robin, chatting with Sarah using OTR (off the record) encryption enabled. When Sarah sends Robin her address, he marks the meeting in his calendar and saves the address in his contacts. Robin then logs into his email to receive a PGP encrypted message from Sarah. His secret key passphrase is retrieved from Apple Keychain. You see that this reveals a picture of a fancy bomb, which Robin saves to his desktop. He then replies to the email with a list of URLs he’s been researching on home made bomb construction. The list was kept in the Notes application, along with several other notes that he doesn’t view during this session. We then suspend the virtual machine to simulate capturing the suspect’s physical memory. We set the Volatility location and profile and then list the processes. You can see the process IDs for the applications involved in most of the user’s activity. First we use the mac notes app plugin to extract the user’s notes. These files contain HTML but we name them with a TXT extension to prevent accidental javascript execution. In this case, its safe to open them in a browser. The results show all of the user’s notes, not just the ones he viewed during the logon session. Now we’ll investigate the user’s contacts. The mac contacts plugin scans for fragments of SQL lite database files and reports the contact names. You can then use the yarascan plugin to inspect memory around those names. For example, in this case, the agent cooper string is found next to the telephone numbers, and emails of all other contacts, including sarah. The mac volshell plugin allows you to interactively explore the memory regions, where you see Sarah’s address. The next command helps us locate memory resident cached files, in particular the user’s primary keychain database. Then the mac dump file plugin can be used to retrieve it from memory. The file is encrypted, so we must use mac keychain dump, a port from the volafox project, to extract a list of possible keys from the memory dump. We download the chain breaker utility and try to crack the database with each of the potential keys. You can see the results include the user’s mail password and GPG private key passphrase. Don’t forget about the user’s chats. Although they were encrypted on the wire due to OTR, they’re plain text in memory. The mac adium plugin extracts the messages to individual text files, which also include date and timestamps. Lastly, let’s get the process ID of the Mail application. This is where the unencrypted PGP mail contents can be located. We use mac yarascan to locate instances of the CSS class that encapsulates email bodies for display in the user interface. Then we use mac volshell to interpret the data as a unicode string and print it to the screen. Finally, we search the cached file list for items in the mail downloads folder. This is where we find the attachment, which can be extracted and analyzed.
Views: 4173 Volatility Project
GPG Installation and Key Generation
 
07:09
How to download/install GPG, generate keys, and configure the Thunderbird Enigmail (http://enigmail.mozdev.org/home/index.php) plugin.
Views: 4770 certcc
Generate or import GnuPG Keys to encrypt messages in cPanel
 
00:33
Generate or import GnuPG Keys to encrypt messages using a "public key" that can only be decrypted by a "private key", which is retained by the intended recipient of the message. cPanel.
Views: 496 hostmydot
whonix install and usage
 
27:57
Whonix is a two part operating system designed for anonymity. It consists of a gateway and a desktop. The purpose of the gateway is to pipe all traffic into the TOR network. For best results, I suggest getting a new hard drive and a copy of a debian based operating system. When installing the system, be sure that you use the full disk encryption option with a strong 32 character passphrase. This is the host system. Ideally, you don't use the host for anything other than running whonix. All of your work is done in the whonix workstation. This protects the integrity of the host system as much as possible. Be sure to harden the host system with HIDS, av, firewall, turn off unnecessary services, etc. Don't be stupid and use something for your host like windows or mac or forget to full disk encrypt your drive. I don't trust veracrypt or truecrypt. Keep your host system updated and watch out for the latest security vulns for the host and whonix (whonix is debian). Remember that you are using TOR, so all OPSEC that is normal for TOR applies here. Don't do something colossaly retarded like do your personal banking or long into facebook. I recommend using Whonix pseudo-nonymously. For example, you know me by my screen name Spike Spiegel. Spike only exists within whonix. This makes the person who uses Spike anonymous, but he is known to the world as one person. Spike is not connected to my real name in any way. This includes never exchanging bitcoin with my irl bitcoin address or having the same interests or frequenting the same IRC channels. Spike is a self contained identity. I already have my Whonix installation setup, so I will walk you through the steps. I will not be executing all of these commands because it would make a 4 hour video with lots of wait time. After installing the host, install virtualbox. 1. Download the images and their signatures. ============================================ https://www.whonix.org/wiki/VirtualBox#Landing 2. Verify image integrity via PGP ================================== # install debian keyring sudo apt-get update && sudo apt-get -y install debian-keyring # initialize gpg gpg --fingerprint # get patrick's key wget https://www.whonix.org/patrick.asc ~/whonix/patrick.asc # turn off gpg errors chmod --recursive og-rwx ~/.gnupg # make sure it is the right key then import it gpg --with-fingerprint ~/whonix/patrick.asc gpg --import ~/whonix/patrick.asc # move into the whonix directory and check the images against the signatures (could take a couple minutes) cd ./whonix gpg --verify-options show-notations --verify Whonix-Gateway-*.ova.asc Whonix-Gateway-*.ova gpg --verify-options show-notations --verify Whonix-Workstation-*.ova.asc Whonix-Workstation-*.ova 3. Import to Virtualbox ======================= 4. Initial start and config of the gateway. =========================================== # change passwords sudo su passwd passwd user # whonix diagnostics check whonixcheck # update it and power off sudo apt-get update && sudo apt-get -y dist-upgrade sudo poweroff # then set the gateway base memory to 256 for minimalist mode. # important commands to remember for running the gateway. whonixcheck sudo apt-get update && sudo apt-get -y dist-upgrade arm # in arm press "n", then "n" again to change the tor circuit. # in arm press "q", then "q" again to quit using the arm. arm is the control interface for the gateway. 5. After the gateway is working start up the workstation ======================================================== # similar diagnostic commands whonixcheck sudo apt-get update && sudo apt-get -y dist-upgrade # change the passwords of root and user sudo su passwd passwd user [!] BE SURE YOU CHANGE THE PASSWORD ON BOTH THE ROOT AND USER ACCOUNT ON BOTH THE GATEWAY AND WORKSTATION [!] # after it boots, it automatically runs whonixcheck so you don't need to run it manually. # run update && upgrade if whonixcheck finishes and says that updates are available. # reboot # download the latest tor browser. # should be in working order, remember to change circuits often.
Views: 9552 Spike Spiegel
[TUTO] Cryptez vos messages pour que personne comprenne !
 
15:22
/!\Lire la description jusqu'au bout, merci /!\ Merci d'avoir regarder notre tuto, nous sommes les 1er a faire ce tuto en france, et ce tuto sintitule "Utiliser entièrement PGP/GPG!" Lien PGP/GPG: http://www.yooclick.com/l/9jyut7 ou http://adf.ly/muuB9 ---------------------------------------------------------------------------------------------- Vous pouvez aussi nous rejoindre sur: Facebook la page: http://www.facebook.com/pages/Crack-And-Hack/336439206473953 Facebook le groupe d'entraide: http://www.facebook.com/groups/395138970591821/ Le forum: http://www.crackandhack.xooit.com/ Lien de parrainage youclick: http://www.yooclick.com/?aff=15209 Lien de parrainage AdFly: http://adf.ly/?id=6633834 Lien de parrainage ClicTune: http://www.clictune.com/?ref=20219 ou http://www.clictune.com/inscription.php?ref=20219 GameHack-Commuauty: http://youtube.com/GameHacCommunauty
Views: 18562 CrackAndHack
NYLUG Presents: Daniel Kahn Gillmor on GnuPG and the Future of OpenPGP (May 29th 2015)
 
01:51:12
Elliptic curves! Decentralized authority! Daemonized architecture! UI/UX improvements! OpenPGP is a popular standard for many kinds of cryptographic communication, from confidential e-mail to identity certification to authenticated software delivery. GnuPG is the flagship implementation of the OpenPGP standard. It has seen some major developments over the last year, and more are yet to come, as new software is built to support OpenPGP and as the standard begins another round of revisions to incorporate more modern cryptography and (hopefully) fix some long-standing warts. Come learn tricks and best practices for making the most of this important toolkit, and get get a sense of the changes ahead. Links: https://www.gnupg.org/ https://www.ietf.org/mail-archive/web/openpgp/current/maillist.html https://wiki.debian.org/Teams/GnuPG Speaker Bio: dkg is a Debian developer and a technologist for the ACLU's Speech, Privacy and Technology project. His focus is on providing secure communications with free software and on improving the security of the protocols we all rely on. He's involved in the process of rechartering the OpenPGP working group in the IETF, and is a member of Debian's GnuPG packaging team and one of the Debian keyring maintainers.
Views: 1147 NYLUG