<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>GPA on Cebulka Blog</title>
    <link>https://cebulka.in/en/tags/gpa/</link>
    <description>Recent content in GPA on Cebulka Blog</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate>Sat, 17 Aug 2024 12:07:00 +0000</lastBuildDate>
    <atom:link href="https://cebulka.in/en/tags/gpa/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>PGP compendium - Encryption and popular PGP tools use guides (2024)</title>
      <link>https://cebulka.in/en/posts/pgp-guides/</link>
      <pubDate>Sat, 17 Aug 2024 12:07:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-guides/</guid>
      <description>&lt;p&gt;A collection of guides for the popular PGP tools: GPG4USB (Linux &amp;amp; Windows), GPA (Linux), Kleopatra (Linux &amp;amp; Windows), GPGSuite (macOS), OpenKeyChain (Android) and PGPro (iOS).&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;what-is-pgp--openpgp&#34;&gt;&#xA;  What is PGP / OpenPGP&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#what-is-pgp--openpgp&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;GnuPG (GPG, GNU Privacy Guard)&lt;/strong&gt; is an open-source encryption software for secure End-to-End communication between two parties. It enables users to communicate securely by providing tools to encrypt and decrypt messages using the OpenPGP (Open Pretty Good Privacy) non-proprietary standard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;OpenPGP&lt;/strong&gt; uses public key cryptography. To use OpenPGP, you must first generate a pair — public and private keys using GPG software. You can then share your public key with others, keeping your private key secret. Anyone who has the public key can use it to encrypt and verify information that only the holder of the private key can decrypt and sign.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;installation-and-configuration&#34;&gt;&#xA;  Installation and configuration&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#installation-and-configuration&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The basic GPG program runs from the command line but there are various front-ends such as GPG4USB, graphical interfaces for different operating systems. The portable GPG4USB program is cross-platform and easy to use but is no longer developed and has an outdated version of GPG. The GNU Privacy Assistant (GPA) tool is available on the Whonix-Workstation system. The Tails system as of version 5.0 has the Kleopatra tool, also known from the Gpg4win package for Windows systems.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/&#34;&gt;Installation of GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/&#34;&gt;Installation of GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/&#34;&gt;Installation of GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/&#34;&gt;Installation of OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/&#34;&gt;Installation of PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;key-generation&#34;&gt;&#xA;  Key generation&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#key-generation&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The user generates a pair of keys, a public key and a private key. The public key is shared with others, while the private key is kept secret. Private key is stored in GPG program files, so it is recommended to encrypt the operating system.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#keygen&#34;&gt;Key generation in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#keygen&#34;&gt;Key generation in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#keygen&#34;&gt;Key generation in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#keygen&#34;&gt;Key generation in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#keygen&#34;&gt;Key generation in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;private-key-backup&#34;&gt;&#xA;  Private key backup&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#private-key-backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#backup&#34;&gt;Private key backup in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#backup&#34;&gt;Private key backup in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#backup&#34;&gt;Private key backup in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#backup&#34;&gt;Private key backup in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#backup&#34;&gt;Private key backup in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;importing-public-keys&#34;&gt;&#xA;  Importing public keys&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#importing-public-keys&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;Import public keys of other users for encrypting messages and verifying digital signatures.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#import&#34;&gt;Importing public keys in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#import&#34;&gt;Importing public keys in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#import&#34;&gt;Importing public keys inGPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#import&#34;&gt;Importing public keys in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#import&#34;&gt;Importing public keys in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-encryption&#34;&gt;&#xA;  Message encryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender uses the recipient&amp;rsquo;s public key to encrypt the message. This ensures that only the intended recipient can decrypt it.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#encryption&#34;&gt;Message encryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#encryption&#34;&gt;Message encryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#encryption&#34;&gt;Message encryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#encryption&#34;&gt;Message encryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#encryption&#34;&gt;Message encryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-decryption&#34;&gt;&#xA;  Message decryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The recipient uses his private key to decrypt the encrypted message. By quoting a sufficient part of it in the reply, also confirms that has access to the private key.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#decryption&#34;&gt;Message decryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#decryption&#34;&gt;Message decryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#decryption&#34;&gt;Message decryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#decryption&#34;&gt;Message decryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#decryption&#34;&gt;Message decryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing-messages&#34;&gt;&#xA;  Signing messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender can use his private key to digitally sign the message. The signature acts as proof that the message was written by the key owner.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#signing&#34;&gt;Signing messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#signing&#34;&gt;Signing messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#signing&#34;&gt;Signing messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#signing&#34;&gt;Signing messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#signing&#34;&gt;Signing messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verifying-messages&#34;&gt;&#xA;  Verifying messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verifying-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;After receiving a signed message, the recipient can use the sender&amp;rsquo;s public key to verify the digital signature of the message. A valid signature proves that the message was sent by the sender and has not been altered. The slightest change in the original message, even by one character, will cause the verification process to fail.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#verification&#34;&gt;Verifying messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#verification&#34;&gt;Verifying messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#verification&#34;&gt;Verifying messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#verification&#34;&gt;Verifying messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#verification&#34;&gt;Verifying messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Troubleshooting&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#troubleshooting&#34;&gt;GnuPG version update in GPG4USB&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;hr&gt;</description>
    </item>
    <item>
      <title>Gnu Privacy Assistant for Linux installation and operation guide</title>
      <link>https://cebulka.in/en/posts/pgp-gpa/</link>
      <pubDate>Sat, 17 Aug 2024 12:01:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-gpa/</guid>
      <description>&lt;p&gt;GNU Privacy Assistant is a user-friendly interface for managing PGP encryption and PGP signatures. This guide describes how to install and use GNU Privacy Assistant on Linux.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;setup&#34;&gt;&#xA;  GNU Privacy Assistant on Whonix-Workstation&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#setup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;blockquote&gt;&#xA;&lt;p&gt;The GNU Privacy Assistant tool is installed by default on Whonix-Workstation and no manual installation of the GPG program is required on this system.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;For Whonix-Workstation on VirtualBox, search for &lt;em&gt;GNU Privacy Assistant&lt;/em&gt; in the menu and click to run.&lt;/li&gt;&#xA;&lt;li&gt;In &lt;em&gt;Qubes OS&lt;/em&gt;, for a created app qube from the &lt;em&gt;whonix-workstation-17&lt;/em&gt; template (for example: default &lt;em&gt;anon-whonix&lt;/em&gt;) select &lt;em&gt;gpa&lt;/em&gt; in the list of &lt;em&gt;All available applications&lt;/em&gt; in the &lt;em&gt;Settings&lt;/em&gt;→&lt;em&gt;Applications&lt;/em&gt; menu, click &lt;em&gt;&amp;gt;&lt;/em&gt; to move the program to the list of &lt;em&gt;Applications shown in App Menu&lt;/em&gt; and confirm the changes by clicking &lt;em&gt;OK&lt;/em&gt;. A shortcut to the GPA / GNU Privacy Assistant program will be visible in the Qubes system menu for the selected app qube.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-024.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;installation-of-gnu-privacy-assistant-with-apt-debian-ubuntu--kali-linux&#34;&gt;&#xA;  Installation of GNU Privacy Assistant with APT (Debian, Ubuntu &amp;amp; Kali Linux)&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#installation-of-gnu-privacy-assistant-with-apt-debian-ubuntu--kali-linux&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;For Debian and Ubuntu distributions, in the command console, perform the installation of the GPA package:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:~$ sudo apt-get update&#xA;user@host:~$ sudo apt-get -y install gpa&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;We can launch the GPA via a shortcut in the application menu or a command:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:~$ gpa&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;installation-of-gnu-privacy-assistant-with-flatpak-other-linux&#34;&gt;&#xA;  Installation of GNU Privacy Assistant with Flatpak (other Linux)&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#installation-of-gnu-privacy-assistant-with-flatpak-other-linux&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Flatpak utility is installed by default in many recent Linux distributions. If the &lt;em&gt;flatpak&lt;/em&gt; command is not available in the console, install Flatpak &lt;a href=&#34;https://flathub.org/setup&#34;&gt;as instructed&lt;/a&gt; for the chosen distribution.&lt;/p&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;We add the Flathub repository and install package &lt;em&gt;org.gnupg.GPA&lt;/em&gt; with commands:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;sudo flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo&#xA;sudo flatpak install -y flathub org.gnupg.GPA&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;We can launch the GPA via a shortcut in the application menu or a command:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:~$ gpa&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;keygen&#34;&gt;&#xA;  Key generation in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#keygen&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;In the pop-up window we click &lt;em&gt;Do it later&lt;/em&gt;. We open the window for changing settings from the &lt;em&gt;Edit&lt;/em&gt; menu by selecting the &lt;em&gt;Preferences&lt;/em&gt; option. In the new window we select &lt;em&gt;Use advanced mode&lt;/em&gt; option and click &lt;em&gt;OK&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-001.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-002.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-003.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;From the &lt;em&gt;Keys&lt;/em&gt; menu, select &lt;em&gt;New key…&lt;/em&gt;. In the &lt;em&gt;Name&lt;/em&gt; field we enter the nickname we will use on the forum. In the &lt;em&gt;Email&lt;/em&gt; field we give the darknet email if we have one, the field can be omitted. The comment field can be omitted. Change the key size in the &lt;em&gt;Key size&lt;/em&gt; field to &lt;em&gt;3072&lt;/em&gt; and click &lt;em&gt;OK&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-004.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;Enter the secure password twice and click &lt;em&gt;OK&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-005.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-006.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;GNU Privacy Assistant does not allow the creation of keys larger than 3072 bits. However, the unofficial standard of 4096-bit PGP keys adopted in the darknet has no basis in any official recommendations,&#xA;and the highest &lt;a href=&#34;https://www.keylength.com/en/compare/&#34;&gt;recommended value by organizations such as ECRYPT-CSA (2018) and NSA (2016)&lt;/a&gt; for the RSA algorithm are the mentioned 3072 bits.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;backup&#34;&gt;&#xA;  Private key backup in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Right click on the desired key from the list and select option &lt;em&gt;Backup…&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-007.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;We point to the secure location, make sure that in the file name the default path ( e.g. &lt;em&gt;/home/user/.gnupg/ …&lt;/em&gt; for Linux systems) does not appear. We click &lt;em&gt;Save&lt;/em&gt;, enter the password we set when generating the key and confirm by clicking &lt;em&gt;OK&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-008.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-009.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;We close the window with information about successful export. The file &lt;em&gt;… .asc&lt;/em&gt; is a text file that contains both the private key block &lt;em&gt;-----BEGIN PGP PRIVATE KEY BLOCK----- …&lt;/em&gt; and the public key block &lt;em&gt;-----BEGIN PGP PUBLIC KEY BLOCK----- …&lt;/em&gt;, which can be imported into another GPG program in the same way public keys are imported.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-010.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;import&#34;&gt;&#xA;  Importing public keys in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#import&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before encrypting a message, we must have the recipient&amp;rsquo;s public key. We can get the public key in an email message, in a private message on the forum or from a user profile.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/pgp-009.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;We import the previously copied public key by selecting the &lt;em&gt;Paste&lt;/em&gt; option from the &lt;em&gt;Edit&lt;/em&gt; menu. We close the window with information about successful export.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-011.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-012.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;The GPA program implements the WOT ( Web Of Trust ) model, so it relies on having other trusted public keys whose owners sign the PGP keys of other users confirming their correctness. To dispense with the attribution of mistrust of the imported PGP key and its owner&amp;rsquo;s signatures, right click on the imported public key and from the context menu option select &lt;em&gt;Sign keys…&lt;/em&gt;. In the new window we select &lt;em&gt;Sign only locally&lt;/em&gt;, confirm by clicking &lt;em&gt;Yes&lt;/em&gt; and enter the password we set when generating the key.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-013.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-014.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-015.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We should make sure that the public key comes from a reliable source and the key fingerprint ( &lt;em&gt;0F3F1 DE0E0 75DE9 …&lt;/em&gt; in the above example ) is correct. A public key with the same name, email address and creation date can be created by anyone and used for impersonation. In this case, we follow the TOFU ( Trust On First Use ) model, that is, we accept the public key on the first import and later verify future key changes.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;encryption&#34;&gt;&#xA;  Message encryption in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before encrypting a message, you have to &lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#import&#34;&gt;import the public key&lt;/a&gt; from the recipient.&lt;/li&gt;&#xA;&lt;li&gt;We open the editor by clicking the clipboard icon. In the text editor of the GPA program, we type the content of the message to be encrypted. We click the encryption icon, select the recipient&amp;rsquo;s public key in the list and click &lt;em&gt;OK&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-016.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-017.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-018.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We do not need to import the public key again when encrypting the next messages. The key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;decryption&#34;&gt;&#xA;  Message decryption in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;We open the editor by clicking the clipboard icon. In the text editor of the GPA program, we paste the encrypted message. We click the decryption icon and ( if a password prompt appears ) we enter the password we set when generating the key.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-016.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-019.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-015.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing&#34;&gt;&#xA;  Signing messages in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;We open the editor by clicking the clipboard icon. In the text editor of the GPA program, we type the content of the message to be signed. We click the signing icon, select our key in the list, click &lt;em&gt;OK&lt;/em&gt; and ( if prompted to enter a password ) enter the password we set when generating the key.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-016.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-020.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-021.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-015.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Avoid signing messages that seem universal. For example, a signed &amp;ldquo;I agree&amp;rdquo; or &amp;ldquo;It&amp;rsquo;s me&amp;rdquo; message can be saved and used to impersonate you in another conversation. Signed messages should be complete sentences describing the purpose and circumstances of the signature.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verification&#34;&gt;&#xA;  Verifying messages in GNU Privacy Assistant&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verification&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before verifying a message, you have to &lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#import&#34;&gt;import the public key&lt;/a&gt; from the author.&lt;/li&gt;&#xA;&lt;li&gt;We open the editor by clicking the clipboard icon. In the text editor of the GPA program, we paste the signed message to be verified. We click the verify icon.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-016.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-022.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPA&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpa/gpa-023.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A valid signature will be marked with &lt;em&gt;Valid&lt;/em&gt; status in green in the GPA program. We do not need to import the public key again when verifying subsequent signatures of the same author. The key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;hr&gt;</description>
    </item>
  </channel>
</rss>
