<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>GPG4USB on Cebulka Blog</title>
    <link>https://cebulka.in/en/tags/gpg4usb/</link>
    <description>Recent content in GPG4USB on Cebulka Blog</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate>Sat, 17 Aug 2024 12:07:00 +0000</lastBuildDate>
    <atom:link href="https://cebulka.in/en/tags/gpg4usb/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>PGP compendium - Encryption and popular PGP tools use guides (2024)</title>
      <link>https://cebulka.in/en/posts/pgp-guides/</link>
      <pubDate>Sat, 17 Aug 2024 12:07:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-guides/</guid>
      <description>&lt;p&gt;A collection of guides for the popular PGP tools: GPG4USB (Linux &amp;amp; Windows), GPA (Linux), Kleopatra (Linux &amp;amp; Windows), GPGSuite (macOS), OpenKeyChain (Android) and PGPro (iOS).&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;what-is-pgp--openpgp&#34;&gt;&#xA;  What is PGP / OpenPGP&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#what-is-pgp--openpgp&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;GnuPG (GPG, GNU Privacy Guard)&lt;/strong&gt; is an open-source encryption software for secure End-to-End communication between two parties. It enables users to communicate securely by providing tools to encrypt and decrypt messages using the OpenPGP (Open Pretty Good Privacy) non-proprietary standard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;OpenPGP&lt;/strong&gt; uses public key cryptography. To use OpenPGP, you must first generate a pair — public and private keys using GPG software. You can then share your public key with others, keeping your private key secret. Anyone who has the public key can use it to encrypt and verify information that only the holder of the private key can decrypt and sign.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;installation-and-configuration&#34;&gt;&#xA;  Installation and configuration&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#installation-and-configuration&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The basic GPG program runs from the command line but there are various front-ends such as GPG4USB, graphical interfaces for different operating systems. The portable GPG4USB program is cross-platform and easy to use but is no longer developed and has an outdated version of GPG. The GNU Privacy Assistant (GPA) tool is available on the Whonix-Workstation system. The Tails system as of version 5.0 has the Kleopatra tool, also known from the Gpg4win package for Windows systems.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/&#34;&gt;Installation of GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/&#34;&gt;Installation of GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/&#34;&gt;Installation of GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/&#34;&gt;Installation of OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/&#34;&gt;Installation of PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;key-generation&#34;&gt;&#xA;  Key generation&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#key-generation&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The user generates a pair of keys, a public key and a private key. The public key is shared with others, while the private key is kept secret. Private key is stored in GPG program files, so it is recommended to encrypt the operating system.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#keygen&#34;&gt;Key generation in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#keygen&#34;&gt;Key generation in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#keygen&#34;&gt;Key generation in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#keygen&#34;&gt;Key generation in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#keygen&#34;&gt;Key generation in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;private-key-backup&#34;&gt;&#xA;  Private key backup&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#private-key-backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#backup&#34;&gt;Private key backup in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#backup&#34;&gt;Private key backup in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#backup&#34;&gt;Private key backup in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#backup&#34;&gt;Private key backup in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#backup&#34;&gt;Private key backup in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;importing-public-keys&#34;&gt;&#xA;  Importing public keys&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#importing-public-keys&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;Import public keys of other users for encrypting messages and verifying digital signatures.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#import&#34;&gt;Importing public keys in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#import&#34;&gt;Importing public keys in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#import&#34;&gt;Importing public keys inGPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#import&#34;&gt;Importing public keys in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#import&#34;&gt;Importing public keys in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-encryption&#34;&gt;&#xA;  Message encryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender uses the recipient&amp;rsquo;s public key to encrypt the message. This ensures that only the intended recipient can decrypt it.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#encryption&#34;&gt;Message encryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#encryption&#34;&gt;Message encryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#encryption&#34;&gt;Message encryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#encryption&#34;&gt;Message encryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#encryption&#34;&gt;Message encryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-decryption&#34;&gt;&#xA;  Message decryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The recipient uses his private key to decrypt the encrypted message. By quoting a sufficient part of it in the reply, also confirms that has access to the private key.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#decryption&#34;&gt;Message decryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#decryption&#34;&gt;Message decryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#decryption&#34;&gt;Message decryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#decryption&#34;&gt;Message decryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#decryption&#34;&gt;Message decryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing-messages&#34;&gt;&#xA;  Signing messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender can use his private key to digitally sign the message. The signature acts as proof that the message was written by the key owner.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#signing&#34;&gt;Signing messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#signing&#34;&gt;Signing messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#signing&#34;&gt;Signing messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#signing&#34;&gt;Signing messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#signing&#34;&gt;Signing messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verifying-messages&#34;&gt;&#xA;  Verifying messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verifying-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;After receiving a signed message, the recipient can use the sender&amp;rsquo;s public key to verify the digital signature of the message. A valid signature proves that the message was sent by the sender and has not been altered. The slightest change in the original message, even by one character, will cause the verification process to fail.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#verification&#34;&gt;Verifying messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#verification&#34;&gt;Verifying messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#verification&#34;&gt;Verifying messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#verification&#34;&gt;Verifying messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#verification&#34;&gt;Verifying messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Troubleshooting&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#troubleshooting&#34;&gt;GnuPG version update in GPG4USB&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;hr&gt;</description>
    </item>
    <item>
      <title>GPG4USB installation and operation guide</title>
      <link>https://cebulka.in/en/posts/pgp-gpg4usb/</link>
      <pubDate>Sat, 17 Aug 2024 12:00:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-gpg4usb/</guid>
      <description>&lt;p&gt;GPG4USB is a user-friendly interface for managing PGP encryption and PGP signatures. This guide describes how to install and use GPG4USB on both Linux and Windows.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;setup&#34;&gt;&#xA;  Installation of GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#setup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Download GPG4USB from &lt;a href=&#34;https://gpg4usb.org/download.html&#34;&gt;official site gpg4usb.org&lt;/a&gt; ( or from &lt;a href=&#34;https://web.archive.org/web/20191206212300/https://gpg4usb.org/gpg4usb-0.3.3-2.zip&#34;&gt;web.archive.org mirror&lt;/a&gt; ) and &lt;strong&gt;extract&lt;/strong&gt; zip contents.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/reg-03.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;For Windows systems run &lt;em&gt;start_windows.exe&lt;/em&gt;, for linux &lt;em&gt;start_linux_32bit&lt;/em&gt; or &lt;em&gt;start_linux_64bit&lt;/em&gt; depending on your system version.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-001.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;Choose your language then skip twice with &lt;em&gt;Next&lt;/em&gt;, uncheck &lt;em&gt;Open offline help&lt;/em&gt; ( not available anymore ), and close with &lt;em&gt;Finish&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-002.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;keygen&#34;&gt;&#xA;  Key generation in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#keygen&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Open &lt;em&gt;Manage keys&lt;/em&gt;. From the &lt;em&gt;Key&lt;/em&gt; tab select &lt;em&gt;Generate key&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-003.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-004.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;Enter the &lt;em&gt;Name&lt;/em&gt; you will use on the forum. In &lt;em&gt;E-mailaddress&lt;/em&gt; you may enter a valid darknet e-mail address or leave this field empty. The comment field is also optional. Set the expiration date to &lt;em&gt;Never Expire&lt;/em&gt; as you may revoke it at any time in future. Change the &lt;em&gt;KeySize&lt;/em&gt; to &lt;em&gt;4096&lt;/em&gt;. Enter secure password and click &lt;em&gt;OK&lt;/em&gt;. It will take a while to generate, close the &lt;em&gt;Keymanagement&lt;/em&gt; window at the end.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-005.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-006.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;The public key can be exported by right-clicking on the selected key pair and selecting &lt;em&gt;Append Selected Key(s) To Text&lt;/em&gt;. Select the entire key and copy it to the clipboard.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-007.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-008.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;if-key-creation-fails-debian-linux&#34;&gt;&#xA;  If key creation fails (Debian Linux)&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#if-key-creation-fails-debian-linux&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The GPG4USB program is no longer under development and has an outdated version of GnuPG, &lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#troubleshooting&#34;&gt;which can be updated&lt;/a&gt; if there are problems with key generation on Linux.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;backup&#34;&gt;&#xA;  Private key backup in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Open &lt;em&gt;Manage keys&lt;/em&gt;. We right-click on the selected key pair and select the &lt;em&gt;Show Keydetails&lt;/em&gt; option. In the new window we click &lt;em&gt;Export Private Key&lt;/em&gt;, confirm by clicking &lt;em&gt;OK&lt;/em&gt; and enter the password we set when generating the key.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-003.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-019.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-020.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-021.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;Select a secure location for the private key file and click &lt;em&gt;Save&lt;/em&gt;. The file &lt;em&gt;… _pub_sec.asc&lt;/em&gt; is a text file that contains both the private key block &lt;em&gt;-&amp;mdash;-BEGIN PGP PRIVATE KEY BLOCK&amp;mdash;&amp;ndash; …&lt;/em&gt; and the public key block &lt;em&gt;-&amp;mdash;-BEGIN PGP PUBLIC KEY BLOCK&amp;mdash;&amp;ndash; …&lt;/em&gt;, which can be imported into another GPG program in the same way public keys are imported.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-022.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;import&#34;&gt;&#xA;  Importing public keys in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#import&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before encrypting a message, we must have the recipient&amp;rsquo;s public key. We can get the public key in an email message, in a private message on the forum or from a user profile.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-009.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;We import the previously copied public key by selecting &lt;em&gt;Clipboard&lt;/em&gt; option from the &lt;em&gt;Import key&lt;/em&gt; menu.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-010.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-011.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We should make sure that the public key comes from a reliable source and the key fingerprint ( &lt;em&gt;0F3F1 DE0E0 75DE9 …&lt;/em&gt; in the above example ) is correct. A public key with the same name, email address and creation date can be created by anyone and used for impersonation. In this case, we follow the TOFU ( Trust On First Use ) model, that is, we accept the public key on the first import and later verify future key changes.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;sudden-shutdown-crash-of-the-program-when-importing-a-key&#34;&gt;&#xA;  Sudden shutdown (crash) of the program when importing a key&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#sudden-shutdown-crash-of-the-program-when-importing-a-key&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The GPG4USB program is no longer developed and has bugs, due to which a sudden shutdown ( crash ) of the program can occur. The errors are not exploitable, but can be annoying. It is recommended in such a case to change the GPG program to another ( GPA, Kleopatra, etc ).&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;encryption&#34;&gt;&#xA;  Message encryption in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before encrypting a message, you have to &lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#import&#34;&gt;import the public key&lt;/a&gt; from the recipient.&lt;/li&gt;&#xA;&lt;li&gt;In the text editor of the GPG4USB program, we type the content of the message to be encrypted. We select the recipient&amp;rsquo;s public key in the list and click &lt;em&gt;Encrypt&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-012.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We do not need to import the public key again when encrypting the next messages. The key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;decryption&#34;&gt;&#xA;  Message decryption in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;In the text editor of the GPG4USB program, we paste the encrypted message. We click &lt;em&gt;Decrypt&lt;/em&gt; and enter the password we set when generating the key.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-013.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-014.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;It may happen that the sender is using Windows system and the newline characters in the message are doubled. Before decrypting, we then correct the formatting of the message by selecting the &lt;em&gt;Remove spacing&lt;/em&gt; option.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-023.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing&#34;&gt;&#xA;  Signing messages in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;In the text editor of the GPG4USB program, we type the content of the message to be signed. We select our key in the list, click &lt;em&gt;Sign&lt;/em&gt; and enter the password we set when generating the key.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-015.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-014.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Avoid signing messages that seem universal. For example, a signed &amp;ldquo;I agree&amp;rdquo; or &amp;ldquo;It&amp;rsquo;s me&amp;rdquo; message can be saved and used to impersonate you in another conversation. Signed messages should be complete sentences describing the purpose and circumstances of the signature.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verification&#34;&gt;&#xA;  Verifying messages in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verification&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Before verifying a message, you have to &lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#import&#34;&gt;import the public key&lt;/a&gt; from the author.&lt;/li&gt;&#xA;&lt;li&gt;In the text editor of the GPG4USB program, we paste the signed message to be verified and click &lt;em&gt;Verify&lt;/em&gt;. We display detailed information by selecting &lt;em&gt;Show detailed verify information&lt;/em&gt; option from the &lt;em&gt;Details&lt;/em&gt; menu.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-016.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-017.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;GPG4USB&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/pgp-018.png#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A correct signature will be marked green in the GPG4USB program. We do not need to import the public key again when verifying next signatures of the same author. The public key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;troubleshooting&#34;&gt;&#xA;  GnuPG version update in GPG4USB&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#troubleshooting&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Find the path of the GPG4USB program and in the console run the program. When trying to generate a key, you may get an &lt;em&gt;Invalid crypto engine&lt;/em&gt; error:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:/path/to/gpg4usb$ ./start_linux_64bit &#xA;[Error] Source:  GPGME  String:  &amp;quot;Invalid crypto engine&amp;quot;&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;In the command console, perform the installation of latest GPGv1:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:~$ sudo apt-get update&#xA;user@host:~$ sudo apt-get -y install gpg&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;li&gt;&#xA;&lt;p&gt;Then replace the GPG binary file in the GPG4USB path with the commands:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;user@host:~$ mv /path/to/gpg4usb/bin/gpg /path/to/gpg4usb/bin/gpg_original&#xA;user@host:~$ ln -s /usr/bin/gpg /path/to/gpg4usb/bin/gpg&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;hr&gt;</description>
    </item>
  </channel>
</rss>
