axiskerop.blogg.se

Gpg mail
Gpg mail






gpg mail gpg mail gpg mail

Sign EMail In order to encrypt an email, you need to take a few more steps than you normally would. You may, of course, combine signing an email with encrypting an email, simply by combining these two steps. When in the body of the email message, click on ''Edit'', ''Paste''.Make sure you type in the email address of the recipient.Go into Outlook, and create a new email message.Using the same program as you used to type it (Notepad or Word), open the file ''c: gnupg ''.Type in the following command: c: gnupg gpg -a -r email -encrypt c: gnupg sendme.doc where ''email'' is the email address of the person you are sending to.Save this document on your hard drive as ''c: gnupg sendme.doc'' Type up the email in a normal way, such as in Notepad, or Microsoft Word.You can then use the same process as in ''Distribute Public Keys'' to send out keys which you have signed.Įncrypt Email In order to encrypt an email, you need to take a few more steps than you We are saying that we are very certain this person actually is who they say they are. It is worth noting that we are not claiming to trust this person by doing this. When asked to save changes, type ''y''.Type in the following command: c: gnupg gpg -edit-key email where ''email'' is the email address of the person who sent you the key.This step is optional, but is done as a courtesy to other people who are online. We can send this signed key back to the person who sent us the public key, and they can use our signature to help prove their online identity. Sign Public keys By signing the public key, we are saying we know that this key belongs to this person. If the two keys match, then you have definitely received that person's public key. They should read their fingerprint while you read. Read the fingerprint you see to the other person.Once you are able to talk to the other person, have them look at their public key just like you are.At this point, you need a reliable way of speaking with the person whose key you are reviewing.Type in the following command: c: gnupg gpg -fingerprint email where ''email'' is the email address of the person who sent you the key.Verify Public Keys Now, we have to make sure that the key we received actually belongs to Type in the following command: c: gnupg gpg -import c: gnupg public.txt.Save the file as ''c: gnupg public.txt''. When you receive their public key, take these steps to You wish to converse with, and request their public key. We have gotten the right one in the next step. While this is very insecure, we will verify that Get Public Keys The easiest way to get a public key is to have somebody email their To send other public keys which you have received, as well. Back in the Outlook email message, click on ''Edit'', followed by ''Paste''.Type in the following command: notepad c: gnupg pubkey.txt.Type in the following command: c: gnupg gpg -o c: gnupg pubkey.txt -a -export email where ''email'' is your email address.On the ''Start bar'', click on your ''DOS box''.Once you're done, you're ready to add your public key to the message.Create a new email message, just like you always do.Simply send them a message, and include the key in it. Let's go through each item, one step at a time.ĭistribute Public Keys Everybody with whom you regularly exchange email should get a copy of

GPG MAIL WINDOWS

Windows NT Click ''Start'', ''Programs'', ''Command Prompt''. To open a ''DOS box'', take the following steps: They are:įor all of them, you will need to have a ''DOS box'' open. There are basically eight things which you will do when working with encrypted email. Next: I want to use Up: I want to use Previous: Using GPG For Windows Contents








Gpg mail