-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1,SHA256
Post by o***@gmail.comHow is the quickest, simplest and cheapest way to get a pair private +
public key, PGP and GPG and openPG, etc compatible (it is ok to forget
very old versions), legal and free to private and company use, with
validity 2014-2020.
I do have a valid 2007-2014 pair, but since 2007 I have not studied the
problem. At that time I have used win4gpg or something that sounds like
that. Here windows SEVEN.
Download and install the latest GPG4Win: http://gp4win.org/download.html
You can use your previous key if you still have it.
Post by o***@gmail.comAlso appreciated any additional advice ONLY IF NEEDED to create the pair,
such as; key length,
subjacent problem (prime factorization, discrete logarithm, elliptic curve, other?)
Your previous key may use the existing defaults, you may extend its life
with a new self-signature.
Otherwise, stick with the defaults. ECC is still in development. RSA and DSA
are available public key choices. In either case, after 3072 bit key
lengths, the action shifts to ECC.
Post by o***@gmail.comkey distribution and infrastructure (I do not want to give away my email address!)
The key servers, but operating two and being a SKS dev, I perhaps am a bit
biased.
Why do you not wish to reveal your email address? It provides the easiest
mechanism for correspondents to find your public key. Without, you will need
to send them your key before they can encrypt to you.
If your are hiding your email address from you key ID to avoid SPAM, I'll
share a short, but very blunt, remark: You are wasting your and your
correspondent's time and ONLY making it more difficult for those who would
use crypto when communicating with you to do so.
Does keyserver address harvesting happen? Possibly, maybe probably.
Does SPAM result from this harvesting? Maybe, I haven't been able to prove
that it does. The only thing I can comfortably conclude from my own work is
that the volume of SPAM from an email address being on a key is
statistically indistinguishable from random email address SPAM. You'll get
more SPAM from posting to an email list such as this than you will from your
address being on a keyserver.
Why is this? I don't know, but I'll hazard the guess that crypto users are a
high effort, low volume, low value target for SPAMmers. They're the folks
most likely to have good filtering and blocking already in place. SPAM is a
low cost high volume operation -- crypto users aren't worth the effort.
Fighting SPAM by obscurity and whack-a-mole email address changes only make
others efforts at communicating more difficult and, some may feel, not worth
the added bother.
Post by o***@gmail.comdigital signature method
Again, the defaults.
I'll second my friend Rob's suggestion of Thunderbird/Seamonkey mail with
the Enigmail extension and GnuPG. (Again, I'll advise of self bias.)
- --
John P. Clizbe Inet: John (a) Gingerbear DAWT net
SKS/Enigmail/PGP-EKP or: John ( @ ) Enigmail DAWT net
FSF Assoc #995 / FSFE Fellow #1797 hkp://keyserver.gingerbear.net or
mailto:pgp-public-***@gingerbear.net?subject=HELP
Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!
Comment: Be part of the £33 ECHELON -- Use Strong Encryption.
Comment: It's YOUR right - for the time being.
Comment: Using GnuPG with SeaMonkey - http://www.enigmail.net/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=
=OYsk
-----END PGP SIGNATURE-----
------------------------------------
______________________________________________________________
Archives: http://groups.yahoo.com/group/PGP-Basics/messages
OT List: http://groups.yahoo.com/group/PGP-Basics-OT
OT Subscribe: mailto:PGP-Basics-OT-***@yahoogroups.com
Gossamer Spider Web of Trust http://www.gswot.org
Yahoo Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/PGP-Basics/
<*> Your email settings:
Individual Email | Traditional
<*> To change settings online go to:
http://groups.yahoo.com/group/PGP-Basics/join
(Yahoo! ID required)
<*> To change settings via email:
PGP-Basics-***@yahoogroups.com
PGP-Basics-***@yahoogroups.com
<*> To unsubscribe from this group, send an email to:
PGP-Basics-***@yahoogroups.com
<*> Your use of Yahoo Groups is subject to:
https://info.yahoo.com/legal/us/yahoo/utos/terms/