Search results “Cryptographic keys and keyrings in pgp desktop”
How To Use PGP/GPG Encryption - In 2 minutes - PGP /GPG Tutorial for Beginners
How To Use PGP Encryption - PGP for Beginners www.VictorDozal.com What is PGP? In 3 minutes https://www.youtube.com/watch?v=1-MPcUHhXoc Generating your PGP keys https://www.igolder.com/pgp/generate-key/ Encrypting a message https://www.igolder.com/PGP/encryption/ Decrypting a message https://www.igolder.com/PGP/decryption/ In this tutorial, I will teach you how to use PGP encryption, including how to get your own PGP keys, encrypt messages, and decrypt messages. If you don't know what PGP encryption is, go ahead and watch my other video "What is PGP encryption? In 3 minutes" https://www.youtube.com/watch?v=1-MPcUHhXoc The three steps needed to use PGP keys are: 1. Generate your PGP keys somehow. 2. Encrypt a message using a PGP public key. 3. Decrypt a message using a PGP private key. If this tutorial helped you in any way, please don’t forget to like the video and subscribe to my channel, as you will be helping me to create more useful tutorials.
Views: 90702 Victor Dozal
How PGP Works
By the end of this lecture you will understand how PGP encryption works and how it keeps your communication over the Dark Web and Deep Web secure.
Views: 53419 Dark Web Academy
how to create PGP key
pgp key pgp key generator pgp key server pgp key id pgp keyring pgp key fingerprint pgp key generator windows pgp key encryption pgp keychain pgp key email pgp key mac pgp key management pgp key generator mac pgp key android pgp key alphabay pgp key armor pgp key algorithm pgp key agora pgp key add pgp key add email address pgp key arch linux pgp key apple pgp add key to keyring pgp key block pgp key bitcoin pgp key business card pgp key blackberry pgp key best practices pgp key backup pgp key base64 pgp key block format pgp key bits pgp key brute force pgp key creator pgp key creation pgp key check pgp key chain pgp key create pgp key comment pgp key could not be imported pgp key commands pgp key converter pgp key decoder pgp key download pgp key database pgp key directory pgp key details pgp key darknet pgp key definition pgp key distribution pgp key dns pgp key debian pgp key example pgp key exchange pgp key extension pgp key expiration
Views: 2074 Houria BL
GPG Encryption Software Free for Mac
Get the Good and Geeky Book - Email Privacy and Security. - https://goodandgeeky.com/PrivacyUS SEND me an email - My Public key is below... http://goo.gl/ycKwa - Mac 20Q - Free file encryption software for Macs is available at gpgtools.org. It works really well and is easy too. GPGTools encrypt text selection and Setting up services - http://www.youtube.com/watch?v=QlNqjSzJor8 A newer video that might help - https://www.youtube.com/watch?v=iziHyMKc1BI Here is my public key = send me an email and I will send you an encrypted email in return. https://goodandgeeky.com/extra/A56033C1.asc Or go to https://goodandgeeky.com/gpg-public-key-send-email/ select and copy the public key text - Then add to your GPG Keyring Looking forward to hearing from you.
Views: 44569 David Allen
Create a PGP Key
How to Create a PGP key on Ubuntu
Views: 21600 Pirate Linux
Beginners Pgp Encryption / How to use GPG Pretty Good Privacy
Get the Book - https://goodandgeeky.com/email-privacy-book-launched/ There is a free PGP Cheatsheet on the page too. PUBLIC KEY BELOW... How to set up Services on your Mac so that you can use GPG from a right click on selected text Watch this tutorial. https://www.youtube.com/watch?v=QlNqjSzJor8 In these days of PRISM and governments being found out for going through all of your emails and collecting all that data it is surely a good idea to encrypt your emails. Personally, very few of my emails contain any sensitive information, but I still don't see why the government's of the world should be able to read my mail. There is paid software that you can get for Pretty Good Privacy, but there is also a free version that you can use called OpenPGP or GPG. In this video I show you how to get started with OpenPGP. How to create a key pair in GPG to put into your GPG tools Keychain access application. In other videos I will be shown you how to use the public and private key so that you can encrypt your email that you sent to your family and friends and business colleagues. https://gpgtools.org/ You should remember that anything that you put onto the Internet is public and not private. For example I needed to send my birth certificate by email and I didn't want that to be in the public domain so I encrypt did the email I used to send that image. It is also possible to encrypt the file and to attach a file like that to the email that you send. These are bite sized videos showing you how to do specific tasks in OpenPGP. The videos are intended for beginners PGP encryption. ------------------------------------ Here is my public key = send me an email and I will send you an encrypted email in return. https://goodandgeeky.com/extra/A56033C1.asc Or go to https://goodandgeeky.com/gpg-public-key-send-email/ select and copy the public key text - Then add to your GPG Keyring Looking forward to hearing from you. ------------------------------- ## Please subscribe to make sure you hear about all the How To videos. You can subscribe here Wizardgold Channel - http://goo.gl/zE2Uc On the Wizardgold Channel you will also find playlists so that you can see all the videos for specific areas of interest. Here is the Playlist for NoStylus - http://goo.gl/WMf7s ## Let's get Social * Twitter - https://twitter.com/wizardgold * FaceBook - http://goo.gl/mz4Gd * GooglePlus - http://goo.gl/SKDeJ Here is the website for more about NoStylus - http://nostylus.com
Views: 27894 David Allen
PGP Encryption Tutorial (using gpg4win and Kleopatra)
A short tutorial on how to use Kleopatra and gpg4win to encrypt messages using public PGP keys. Download gpg4win and Kleopatra here: http://www.gpg4win.org/ ** Also, an easier way instead of saving the persons public key as a GPG. Just have is saved to your clipboard and click on the system tray and click 'Certificate Import' and it does it all it's self :) (Harvey Crumpet)
Views: 173828 Kevin Cronly
Encrypt your e-mail, Setting up PGP on Thunderbird & Linux GPG CLI tutorial
In this video I will show you how to setup your Mozilla Thunderbird e-mail client to use PGP (Pretty Good Privacy) encryption, along with setting up your PGP keys, publishing them, test e-mails, how to encrypt regular files with PGP on both Windows and Linux, and go over how to use PGP on the Linux command line as well. https://www.gpg4win.org/ https://www.enigmail.net/ Well known Key Servers: http://pgp.mit.edu/ http://keyserver.ubuntu.com/ http://keyserver.pgp.com/ Cheat sheet, Linux commands: Encrypt file or e-mail: gpg -e -r [email protected] filename -e Tells gpg to encrypt a file with PGP -a (--armor) ASCII plaintext, used for e-mails -r Recipient, who you want to encrypt the file for, this can be for yourself or someone else Decrypt e-mail or file: gpg -d filename -d Tells gpg to decrypt the file, you must have the private key on said server's keyring to decrypt said file -o specify output file name, otherwise spit out the file in stdout. List public keys: gpg --list-keys List private keys: gpg --list-secret-keys Import public key: gpg --import key.asc Import private key: gpg --allow-secret-key-import --import Export public key: gpg -a --export [email protected] Export private key: gpg -a --export-secret-keys [email protected] Delete public key: gpg --delete-key [email protected] Delete private key: gpg --delete-secret-key [email protected]m Questions? IRC: irc.gtaxl.net +6697 #GTAXLnet E-Mail: [email protected] (F5903927) PGP: http://pgp.mit.edu/pks/lookup?op=get&search=0xBA7C77A6F5903927
Views: 2091 TheN3tw0rq
GPG Key Tutorial
How-TO: Create a Key Pair for use with Evolution Email
Views: 2305 boriddlin
Create a GPG Key
Views: 833 Seth Jennings
How to Generate a New PGP/GPG Key from Scratch
This video walks you through creating a new PGP key using the open source GnuPG software.
Views: 11975 Anthony Papillion
gpg4usb complete tutorial
Learn how to create an encryption key, encrypt, decrypt, sign, and verify messages all in an easy to understand visual tutorial. You can download gpg4usb here: http://www.gpg4usb.org/ After downloading the program, simply unzip the files and launch "Start_Windows" if you're on a windows computer and "Start_Linux" if you're using Linux. The Crypto Scriptorium allows authors the chance to publish their works anonymously without fear of retribution and still get paid for their time and efforts. For more information, please visit us at: http://cryptoscript.tumblr.com
Views: 20455 Crypto Scriptorium
John the Ripper: How to Recover Your PGP Private Key Password
Please check out my Udemy courses! Coupon code applied to following links.... Kali Linux Hands-on Penetration Testing Labs: https://www.udemy.com/kali-linux-hands-on-penetration-testing-labs/?couponCode=TENDOLLARS Network Security Analysis Using Wireshark, Snort, and SO: https://www.udemy.com/network-security-analysis-using-wireshark-snort-and-so/?couponCode=TENDOLLARS Snort Intrusion Detection, Rule Writing, and PCAP Analysis: https://www.udemy.com/snort-intrusion-detection-rule-writing-and-pcap-analysis/?couponCode=TENDOLLARS Description: This video will show you how to use dictionary and brute force password cracking methodology to recover PGP private key passwords. The tool which is used for this purpose is John the Ripper Bleeding Jumbo version on Kali Linux. The following URLs is where you can acquire JTR and the crackstation wordlist: https://github.com/magnumripper/JohnTheRipper https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm
Views: 7914 Jesse Kurrus
Encrypt a File
How to encrypt a file on Ubuntu
Views: 4663 Pirate Linux
How-To: Export Your PGP Public Key to Send to Others
In order to exchange encrypted email with other people, you must send them your public PGP key and they must send you theirs. This video shows you how to export your key to a format that is ready to send to others!
Views: 9887 Anthony Papillion
How To Create Private and Public Keys Using GPG4win
This tutorial will show you how to create your private and public keys in GPG4win. For more tutorials, visit http://www.interpayroll.co.uk/blog
Views: 40017 interpayroll
Exporting and Importing PGP Keys
This video shows you how to export and import a key using PGP.
Views: 12446 Dan Guilmette
How to use public keys for encrypted  messages
This is done iwith Cryptophane7.0 Open Source Free Encryption Software Get it Here: http://code.google.com/p/cryptophane/downloads/list
Views: 495 Laura McCallum
PGP avain - Ubuntu
Ennen kun pystyt käyttämään PGP-salausta, tarvitset avaimen sitä varten. Videolla opastetaan ubuntun PGP-avaimen luominen.
Views: 277 ThePyora
Talk: OpenKeychain
Talk von Dominik am 14. September 2014 Lizenz: CC-BY-SA 3.0 OpenKeychain: http://www.openkeychain.org/ Stratum 0: https://stratum0.org
Views: 195 Stratum 0
How To Install GPG
This tutorial will show you how to install the PGP encryption software, GPG4win. For more tutorials, visit http://www.interpayroll.co.uk/blog
Views: 13025 interpayroll
GNUPG-Exporting Public Key.mpeg
Exporting a public key
Views: 276 nitcgnupg
005.Backup der beiden PGP Keyrings (OSX)
Backup des Schlüsselpärchens anlegen
Views: 47 Dirk Kuepper
Claws Mail - Public PGP key selection
This is how Claws Mail chooses a public key to encrypt to when you write to a recipient for which you have the key: it chooses it by email address, asks you for verification if the trust isn't full, and lets you manually choose if no email matches in the public keyring.
Views: 1784 Colin Leroy-Mira
GnuPG Tutorial Part 3: Exchanging Keys
How to exchange public keys in GPG
Views: 16071 GnuGPTutorial
KDE TeaTime #0
Bunch of KDE developers discussing stuff about and around KDE. In this installment: * KDE branding * KDE 4.9 release favorite features * KDE Quality team intro * Social integration in KDE * Telepathy in KDE All projects we discussed are available on KDE's git infrastructure: * WebAccounts - http://quickgit.kde.org/index.php?p=web-accounts.git * Akonadi Facebook - http://quickgit.kde.org/index.php?p=akonadi-facebook.git * Social Feed - http://quickgit.kde.org/index.php?p=scratch%2Fmklapetek%2Fsocialfeed.git
Kgpg 2.X is a piece of shit
Hey guyz do you want software that is unable to do anything? Then use Kgpg! It is GPG (see also shit) only with KDE!
Views: 390 Thomas Kilburn
freenigma in action!
This video shows, how Alice and Bob exchange encrypted e-mail between their Yahoo! Mail and Google Mail accounts by using freenigma. (see: http://www.freenigma.com for more)
Views: 2540 Stefan Richter
In this tutorial video youll learn how to add new contacts in your n-Tegritys address book and add his/her public key. Then youll be able to send encrypted files/attachments to all your contacts. See http://ntrance-global.com Special thanks to http://www.safeclick.it (Italian representatives for Strong Authentication tools)
Views: 134 ntranceglobal
E-mail Encryption for Beginners: Gpg4Win, Outlook Privacy Plugin, and Mailvelope
This tutorial explains how to install and use GnuPG for certificate (public / private key pair) management; the Outlook Privacy Plugin for working with encrypted e-mails in Microsoft Office Outlook; and Mailvelope for working with encrypted e-mails via web-based e-mail services such as Gmail or Yahoo! Mail. Links: -------- GnuPG for Windows: http://www.gpg4win.org/ Outlook Privacy Plugin: http://code.google.com/p/outlook-privacy-plugin/ Mailvelope: http://www.mailvelope.com/
Views: 34262 calraith
This screencast walks you through making a PGP key using the default Ubuntu Application Seahorse. It also covers making a backup and a revocation certificate.
Views: 1009 ubuntuscreencasts
[TUTO] Cryptez vos messages pour que personne comprenne !
/!\Lire la description jusqu'au bout, merci /!\ Merci d'avoir regarder notre tuto, nous sommes les 1er a faire ce tuto en france, et ce tuto sintitule "Utiliser entièrement PGP/GPG!" Lien PGP/GPG: http://www.yooclick.com/l/9jyut7 ou http://adf.ly/muuB9 ---------------------------------------------------------------------------------------------- Vous pouvez aussi nous rejoindre sur: Facebook la page: http://www.facebook.com/pages/Crack-And-Hack/336439206473953 Facebook le groupe d'entraide: http://www.facebook.com/groups/395138970591821/ Le forum: http://www.crackandhack.xooit.com/ Lien de parrainage youclick: http://www.yooclick.com/?aff=15209 Lien de parrainage AdFly: http://adf.ly/?id=6633834 Lien de parrainage ClicTune: http://www.clictune.com/?ref=20219 ou http://www.clictune.com/inscription.php?ref=20219 GameHack-Commuauty: http://youtube.com/GameHacCommunauty
Views: 18883 CrackAndHack
NYLUG Presents: Daniel Kahn Gillmor on GnuPG and the Future of OpenPGP (May 29th 2015)
Elliptic curves! Decentralized authority! Daemonized architecture! UI/UX improvements! OpenPGP is a popular standard for many kinds of cryptographic communication, from confidential e-mail to identity certification to authenticated software delivery. GnuPG is the flagship implementation of the OpenPGP standard. It has seen some major developments over the last year, and more are yet to come, as new software is built to support OpenPGP and as the standard begins another round of revisions to incorporate more modern cryptography and (hopefully) fix some long-standing warts. Come learn tricks and best practices for making the most of this important toolkit, and get get a sense of the changes ahead. Links: https://www.gnupg.org/ https://www.ietf.org/mail-archive/web/openpgp/current/maillist.html https://wiki.debian.org/Teams/GnuPG Speaker Bio: dkg is a Debian developer and a technologist for the ACLU's Speech, Privacy and Technology project. His focus is on providing secure communications with free software and on improving the security of the protocols we all rely on. He's involved in the process of rechartering the OpenPGP working group in the IETF, and is a member of Debian's GnuPG packaging team and one of the Debian keyring maintainers.
Views: 1153 NYLUG
GPG Installation and Key Generation
How to download/install GPG, generate keys, and configure the Thunderbird Enigmail (http://enigmail.mozdev.org/home/index.php) plugin.
Views: 4781 certcc
How Do I Tails?: A Beginner's Guide to Anonymous Computing
This talk serves as an introduction to The Amnesic Incognito Live System and anonymous computing. It covers why privacy is important, the various features of the operating system, and also touches on some basics of threat modeling and operational security. This talk was given at DEF CON 23 in the EFF's Crypto & Privacy Village. Due to limited village space, there were actually two presentations operating at the same time, hence the background noise. The microphone that I was using was pretty poor quality, and as such the audio isn't the best. I have taken the time to transcribe the audio to try and compensate for these problems, so try giving the captions a run. When the audio cuts out, it is due to someone speaking off screen and I removed the audio to protect their privacy. Since this presentation was given in August of 2015, there are portions that are now out of date or irrelevant. I will attempt to provide corrections and updates either in the description or annotations on the video itself. If you notice something that needs correction, send me a message and I'd be happy to tweak it. Big thanks to my buddy Kyle Hinckley, a.k.a. The Weirdist for his help in getting this project edited and rendered. He runs a channel showcasing strange builds in Bethesda games, so if that's your kind of thing check out his channel here: https://www.youtube.com/user/WeirdistBuilds Relevant links: Talk transcript: http://pastebin.com/4ZQXR7Vv Current Tails Installation Instructions: https://tails.boum.org/install/index.en.html Crypto Village site for handouts - https://cryptovillage.org/archives/dc23/ Tails - https://tails.boum.org/ Whonix - https://www.whonix.org/ Qubes OS - https://www.qubes-os.org/ Tor Project - https://www.torproject.org/ Electronic Frontier Foundation - https://www.eff.org/ Freedom of the Press Foundation - https://freedom.press/ Errata: 2016/01/13 - I was mistaken about the method that Tails uses for time synchronization. See more information here: https://tails.boum.org/contribute/design/Time_syncing/ 2016/01/15 - Added annotation for the Whonix page regarding Tor/VPN combinations: https://www.whonix.org/wiki/Tunnels/Introduction 2016/07/07 - Since I've been getting a lot of spam comments on here about VPNs, here's a brief snippet about them from the Whonix Wiki: "Improper combination of Tor and another service may decrease your security and anonymity.... almost all users of Whonix, using Tor alone – without a VPN or proxy – is the right choice."
Views: 123610 Forrest Barth
HOWTO: Install GnuPG Shell and Create a Key Ring
How to install GnuPG Shell and create a key ring. GnuPG Shell is a cross-platform GUI for the GNU Privacy Guard. Go to http://www.tech-faq.com/gnupg-shell.shtml to download GnuPG Shell.
Views: 5723 Will Spencer
Keychain Access on Mac OS X - Tutorial and Introduction
A Keychain Access for Mac OS X tutorial and introduction. This video gives users an overview of what Keychain Access on Mac is and how to get started with using Keychain Access. Mac for Beginners Tutorial: https://www.youtube.com/watch?v=MN0FD8KW2V4 Published by Anson Alexander from http://AnsonAlex.com
Views: 175284 Anson Alexander
Import Missing GPG Keys In Ubuntu By Charlie.
Join my Blog http://charlieswinlinux.blogspot.com/ Here are the Scripts sudo add-apt-repository ppa:nilarimogard/webupd8 sudo apt-get update sudo apt-get install launchpad-getkeys Then, to import all the missing GPG keys, run the following command: sudo launchpad-getkeys http://charlieslinux.blogspot.com/
Views: 731 Charlie Henson
Generate or import GnuPG Keys to encrypt messages in cPanel
Generate or import GnuPG Keys to encrypt messages using a "public key" that can only be decrypted by a "private key", which is retained by the intended recipient of the message. cPanel.
Views: 499 hostmydot
Towards a more secure operating system without sacrificing usability (GPN17)
https://media.ccc.de/v/gpn17-8484-towards_a_more_secure_operating_system_without_sacrificing_usability aka the GNOME challenge GNOME is a desktop that cares about its users and their freedom. To be free also includes to have the freedom to use your computer without having to fear of getting compromised or anyone listening to your communication. GNOME takes tries hard to put the user back into the control seat regarding security and privacy. We will see two examples of how GNOME gives you back that control. The first is a classic: The problem of signing OpenPGP keys. The second is the protection against malicious USB devices. Muelli
Views: 792 media.ccc.de
Black Hat USA 2003 - Keynote: Pretty Good Privacy
By: Philip R. Zimmermann
Views: 129 Black Hat
Installing and Verifying ISO Files GPG Method - Linux SolusOS (Gnome) Part 3
[There is no audio for this video] 0:14 Preparing for BSD TrueOS - Lumina ISO 1:27 Terminal Commands cd Downloads/TrueOS/ gpg --import releng-trueos-pub.asc gpg --verify latest.img.sig gpg --list-keys --with-fingerprint 1F017190 gpg --verify latest.img.sig latest.img sha256sum --check --ignore-missing latest.img.sha256 Operating System: Linux SolusOS (Gnome) Video Capture Program: Open Broadcaster Studio - OBS (Linux) Video Editing Program: Camtasia 9 (Windows 10) Sources & Credits: N/A Installing and Verifying ISO Files GPG Method - Linux SolusOS (Gnome) Part 1 https://www.youtube.com/watch?v=lh78N6-Kcko Installing and Verifying ISO Files GPG Method - Linux SolusOS (Gnome) Part 2 https://www.youtube.com/watch?v=OHpgNW9pJxA Installing and Verifying ISO Files GPG Method - Linux SolusOS (Gnome) Part 3 https://www.youtube.com/watch?v=yKsl9gIEgkk
Manually Remove "Your personal files are encrypted" by  Cryptowall/Cryptorbit/Cryptolocker & others
Remove Cryptorbit, Cryptolocker, Cryptowall & others manually. No software required. I show you how to remove Cryptorbit but its the same exact steps to remove Cryptolocker as well as other similar infections. Follow me step by step. Pause this video if you need to. We will go into the registry but i will go slowly so pay attention. -First thing to do is go into you control panel and uninstall anything to do with Crypt. Some of you will have something in there, others will not. -Next we restart computer into "safe mode". Once your your computer starts to reboot back up, keep pressing the F8 key to get it in safe mode. Once there highlight and click "safe mode". -Once your computer is booted up and in safe mode click on the start button and type in "regedit" - Now, follow this exact path.. Hkey_current_User--software--microsoft--windows--current version--run- now look for Cryptorbit, right click it and press delete. And click yes to the prompt asking if you are sure you want to delete it. - Now click on the Start menu then click on "Administrator", then Appdata--Roaming-- then find and delete Cryptorbit. - Restart your computer as normal. And there you go. Congrats to you, you just did actually what these free programs will do except for adding additional malware on your computer. Please sub and Like if this worked for you. Thank you! Cyyptorbit Your personal files are encrypted. All files including videos, photos and documents, etc. on computer are encrypted. Encryption was produced using a unique public key generated for this computer. To decrypt files, you need to obtain the private key. The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this windows. After that, nobody and never will be to restore files. File decryption cost ~ $50. (some will say $200) In order to decrypt the files, open site 4sfxctgp53imlvzk.onion.to/index.php and follow the instruction. If 4sfxctgp53imlvzk.onion.to is not opening, please following steps below: 1. You must download and install this browser: http://www.torproject.org/projects/torbrowser.html.en 2. After installation, run the browser and enter the address: 4sfxctgp53imlvzk.onion.to/index.php 3. Follow the instructions on the web-site. We remind you that the sooner you do, the more changes are left to recover the files. Guaranteed recovery is provided within 10 days. http://barnegat-manahawkin.patch.com/groups/police-and-fire/p/prosecutor-warns-of-latest-home-computer-virus Prosecutor Warn of Latest Computer Virus
Views: 196356 iLuvTrading
whonix install and usage
Whonix is a two part operating system designed for anonymity. It consists of a gateway and a desktop. The purpose of the gateway is to pipe all traffic into the TOR network. For best results, I suggest getting a new hard drive and a copy of a debian based operating system. When installing the system, be sure that you use the full disk encryption option with a strong 32 character passphrase. This is the host system. Ideally, you don't use the host for anything other than running whonix. All of your work is done in the whonix workstation. This protects the integrity of the host system as much as possible. Be sure to harden the host system with HIDS, av, firewall, turn off unnecessary services, etc. Don't be stupid and use something for your host like windows or mac or forget to full disk encrypt your drive. I don't trust veracrypt or truecrypt. Keep your host system updated and watch out for the latest security vulns for the host and whonix (whonix is debian). Remember that you are using TOR, so all OPSEC that is normal for TOR applies here. Don't do something colossaly retarded like do your personal banking or long into facebook. I recommend using Whonix pseudo-nonymously. For example, you know me by my screen name Spike Spiegel. Spike only exists within whonix. This makes the person who uses Spike anonymous, but he is known to the world as one person. Spike is not connected to my real name in any way. This includes never exchanging bitcoin with my irl bitcoin address or having the same interests or frequenting the same IRC channels. Spike is a self contained identity. I already have my Whonix installation setup, so I will walk you through the steps. I will not be executing all of these commands because it would make a 4 hour video with lots of wait time. After installing the host, install virtualbox. 1. Download the images and their signatures. ============================================ https://www.whonix.org/wiki/VirtualBox#Landing 2. Verify image integrity via PGP ================================== # install debian keyring sudo apt-get update && sudo apt-get -y install debian-keyring # initialize gpg gpg --fingerprint # get patrick's key wget https://www.whonix.org/patrick.asc ~/whonix/patrick.asc # turn off gpg errors chmod --recursive og-rwx ~/.gnupg # make sure it is the right key then import it gpg --with-fingerprint ~/whonix/patrick.asc gpg --import ~/whonix/patrick.asc # move into the whonix directory and check the images against the signatures (could take a couple minutes) cd ./whonix gpg --verify-options show-notations --verify Whonix-Gateway-*.ova.asc Whonix-Gateway-*.ova gpg --verify-options show-notations --verify Whonix-Workstation-*.ova.asc Whonix-Workstation-*.ova 3. Import to Virtualbox ======================= 4. Initial start and config of the gateway. =========================================== # change passwords sudo su passwd passwd user # whonix diagnostics check whonixcheck # update it and power off sudo apt-get update && sudo apt-get -y dist-upgrade sudo poweroff # then set the gateway base memory to 256 for minimalist mode. # important commands to remember for running the gateway. whonixcheck sudo apt-get update && sudo apt-get -y dist-upgrade arm # in arm press "n", then "n" again to change the tor circuit. # in arm press "q", then "q" again to quit using the arm. arm is the control interface for the gateway. 5. After the gateway is working start up the workstation ======================================================== # similar diagnostic commands whonixcheck sudo apt-get update && sudo apt-get -y dist-upgrade # change the passwords of root and user sudo su passwd passwd user [!] BE SURE YOU CHANGE THE PASSWORD ON BOTH THE ROOT AND USER ACCOUNT ON BOTH THE GATEWAY AND WORKSTATION [!] # after it boots, it automatically runs whonixcheck so you don't need to run it manually. # run update && upgrade if whonixcheck finishes and says that updates are available. # reboot # download the latest tor browser. # should be in working order, remember to change circuits often.
Views: 10354 Spike Spiegel