<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>GPGSuite on Cebulka Blog</title>
    <link>https://cebulka.in/en/tags/gpgsuite/</link>
    <description>Recent content in GPGSuite on Cebulka Blog</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate>Sat, 17 Aug 2024 12:07:00 +0000</lastBuildDate>
    <atom:link href="https://cebulka.in/en/tags/gpgsuite/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>PGP compendium - Encryption and popular PGP tools use guides (2024)</title>
      <link>https://cebulka.in/en/posts/pgp-guides/</link>
      <pubDate>Sat, 17 Aug 2024 12:07:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-guides/</guid>
      <description>&lt;p&gt;A collection of guides for the popular PGP tools: GPG4USB (Linux &amp;amp; Windows), GPA (Linux), Kleopatra (Linux &amp;amp; Windows), GPGSuite (macOS), OpenKeyChain (Android) and PGPro (iOS).&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;what-is-pgp--openpgp&#34;&gt;&#xA;  What is PGP / OpenPGP&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#what-is-pgp--openpgp&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;GnuPG (GPG, GNU Privacy Guard)&lt;/strong&gt; is an open-source encryption software for secure End-to-End communication between two parties. It enables users to communicate securely by providing tools to encrypt and decrypt messages using the OpenPGP (Open Pretty Good Privacy) non-proprietary standard.&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;OpenPGP&lt;/strong&gt; uses public key cryptography. To use OpenPGP, you must first generate a pair — public and private keys using GPG software. You can then share your public key with others, keeping your private key secret. Anyone who has the public key can use it to encrypt and verify information that only the holder of the private key can decrypt and sign.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;installation-and-configuration&#34;&gt;&#xA;  Installation and configuration&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#installation-and-configuration&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The basic GPG program runs from the command line but there are various front-ends such as GPG4USB, graphical interfaces for different operating systems. The portable GPG4USB program is cross-platform and easy to use but is no longer developed and has an outdated version of GPG. The GNU Privacy Assistant (GPA) tool is available on the Whonix-Workstation system. The Tails system as of version 5.0 has the Kleopatra tool, also known from the Gpg4win package for Windows systems.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/&#34;&gt;Installation of GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/&#34;&gt;Installation of GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/&#34;&gt;Installation of Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/&#34;&gt;Installation of GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/&#34;&gt;Installation of OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/&#34;&gt;Installation of PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;key-generation&#34;&gt;&#xA;  Key generation&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#key-generation&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The user generates a pair of keys, a public key and a private key. The public key is shared with others, while the private key is kept secret. Private key is stored in GPG program files, so it is recommended to encrypt the operating system.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#keygen&#34;&gt;Key generation in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#keygen&#34;&gt;Key generation in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#keygen&#34;&gt;Key generation in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#keygen&#34;&gt;Key generation in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#keygen&#34;&gt;Key generation in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#keygen&#34;&gt;Key generation in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;private-key-backup&#34;&gt;&#xA;  Private key backup&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#private-key-backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#backup&#34;&gt;Private key backup in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#backup&#34;&gt;Private key backup in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#backup&#34;&gt;Private key backup in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#backup&#34;&gt;Private key backup in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#backup&#34;&gt;Private key backup in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#backup&#34;&gt;Private key backup in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;importing-public-keys&#34;&gt;&#xA;  Importing public keys&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#importing-public-keys&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;Import public keys of other users for encrypting messages and verifying digital signatures.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#import&#34;&gt;Importing public keys in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#import&#34;&gt;Importing public keys in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#import&#34;&gt;Importing public keys in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#import&#34;&gt;Importing public keys inGPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#import&#34;&gt;Importing public keys in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#import&#34;&gt;Importing public keys in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-encryption&#34;&gt;&#xA;  Message encryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender uses the recipient&amp;rsquo;s public key to encrypt the message. This ensures that only the intended recipient can decrypt it.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#encryption&#34;&gt;Message encryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#encryption&#34;&gt;Message encryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#encryption&#34;&gt;Message encryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#encryption&#34;&gt;Message encryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#encryption&#34;&gt;Message encryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#encryption&#34;&gt;Message encryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;message-decryption&#34;&gt;&#xA;  Message decryption&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#message-decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The recipient uses his private key to decrypt the encrypted message. By quoting a sufficient part of it in the reply, also confirms that has access to the private key.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#decryption&#34;&gt;Message decryption in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#decryption&#34;&gt;Message decryption in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#decryption&#34;&gt;Message decryption in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#decryption&#34;&gt;Message decryption in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#decryption&#34;&gt;Message decryption in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#decryption&#34;&gt;Message decryption in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing-messages&#34;&gt;&#xA;  Signing messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;The sender can use his private key to digitally sign the message. The signature acts as proof that the message was written by the key owner.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#signing&#34;&gt;Signing messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#signing&#34;&gt;Signing messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#signing&#34;&gt;Signing messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#signing&#34;&gt;Signing messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#signing&#34;&gt;Signing messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#signing&#34;&gt;Signing messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verifying-messages&#34;&gt;&#xA;  Verifying messages&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verifying-messages&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;p&gt;After receiving a signed message, the recipient can use the sender&amp;rsquo;s public key to verify the digital signature of the message. A valid signature proves that the message was sent by the sender and has not been altered. The slightest change in the original message, even by one character, will cause the verification process to fail.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#verification&#34;&gt;Verifying messages in GPG4USB&lt;/a&gt; (Linux &amp;amp; Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpa/#verification&#34;&gt;Verifying messages in GNU Privacy Assistant&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-linux/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Linux)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-kleopatra-windows/#verification&#34;&gt;Verifying messages in Kleopatra&lt;/a&gt; (Windows)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/#verification&#34;&gt;Verifying messages in GPG Suite&lt;/a&gt; (macOS)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-openkeychain/#verification&#34;&gt;Verifying messages in OpenKeychain&lt;/a&gt; (Android)&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-pgpro/#verification&#34;&gt;Verifying messages in PGPro&lt;/a&gt; (iOS)&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Troubleshooting&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cebulka.in/en/posts/pgp-gpg4usb/#troubleshooting&#34;&gt;GnuPG version update in GPG4USB&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;hr&gt;</description>
    </item>
    <item>
      <title>GPGSuite for Mac OS installation and GPG Keychain operation guide</title>
      <link>https://cebulka.in/en/posts/pgp-gpgsuite/</link>
      <pubDate>Sat, 17 Aug 2024 12:04:00 +0000</pubDate>
      <guid>https://cebulka.in/en/posts/pgp-gpgsuite/</guid>
      <description>&lt;p&gt;GPGSuite is a comprehensive toolset for managing PGP encryption and PGP signatures on macOS. This guide describes how to install GPGSuite how and use GPG Keychain on Mac OS.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;setup&#34;&gt;&#xA;  Installing GPG Suite on macOS&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#setup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Download GPG Suite from the official website: &lt;a href=&#34;https://gpgtools.org&#34;&gt;https://gpgtools.org&lt;/a&gt;.&lt;/li&gt;&#xA;&lt;li&gt;Open the downloaded DMG file and drag the GPG Keychain application to the Applications folder.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Installation 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-002.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Installation 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-004.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;After installation, launch GPG Keychain using Finder or Spotlight.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Installation 3&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-016.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;keygen&#34;&gt;&#xA;  Generating keys in GPG Keychain&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#keygen&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Open the GPG Keychain application and click the &lt;em&gt;New&lt;/em&gt; button.&lt;/li&gt;&#xA;&lt;li&gt;Enter your nickname and set a passphrase for the key, which will be used to protect it.&lt;/li&gt;&#xA;&lt;li&gt;Select your preferred key algorithm and size (e.g., RSA, 4096 bits) and click &lt;em&gt;Create Key&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Key Generation 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-017.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;4&#34;&gt;&#xA;&lt;li&gt;When prompted to upload the key, click &lt;em&gt;No, thanks!&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Key Generation 4&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-018.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;backup&#34;&gt;&#xA;  Backing up the private key in GPG Keychain&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#backup&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Go to the key management screen, select your private key, and click &lt;em&gt;Export&amp;hellip;&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Backup 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-020.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;2&#34;&gt;&#xA;&lt;li&gt;Select the location where you want to save the key, and click &lt;em&gt;Save&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Backup 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-021.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;Ensure the key is saved in a secure location.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Backup 3&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-026.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;A backup copy of the private key should be encrypted with &lt;a href=&#34;https://www.veracrypt.fr/en/Home.html&#34;&gt;VeraCrypt&lt;/a&gt; or &lt;a href=&#34;https://www.truecrypt71a.com/&#34;&gt;TrueCrypt&lt;/a&gt; and placed on external media for protection against data loss.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;import&#34;&gt;&#xA;  Importing public keys in GPG Keychain&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#import&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Open the email or other communication containing the public key.&lt;/li&gt;&#xA;&lt;li&gt;Copy the public key to the clipboard. The application will automatically detect the key in the clipboard.&lt;/li&gt;&#xA;&lt;li&gt;Open the GPG Keychain application and select the &lt;em&gt;Import&lt;/em&gt; option.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Key Import 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-027.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;4&#34;&gt;&#xA;&lt;li&gt;Then certify the public key to confirm its authenticity. Right-click on the key and select &lt;em&gt;Details&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Key Import 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-029.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;5&#34;&gt;&#xA;&lt;li&gt;Confirm the key signing by selecting Ownertrust &lt;em&gt;Ultimate&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Key Import 3&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-030.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;If the key was not automatically detected, click &lt;em&gt;Import&lt;/em&gt;.&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;encryption&#34;&gt;&#xA;  Encrypting messages in GPG Suite&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#encryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Copy the message content you want to encrypt to the clipboard.&lt;/li&gt;&#xA;&lt;li&gt;Right-click on the copied text or the text document you want to encrypt.&lt;/li&gt;&#xA;&lt;li&gt;From the context menu, select &lt;em&gt;Services&lt;/em&gt; .&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Encryption 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-032.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;4&#34;&gt;&#xA;&lt;li&gt;Select the recipient&amp;rsquo;s public key from the list of available keys and click &lt;em&gt;Encrypt&lt;/em&gt;.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Encryption 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-033.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;5&#34;&gt;&#xA;&lt;li&gt;After encrypting the message, copy the resulting text to the clipboard or save it to a file.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Encryption 3&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-034.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We do not need to import the public key again when encrypting the next messages. The key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;decryption&#34;&gt;&#xA;  Decrypting messages in GPG Suite&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#decryption&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Copy the encrypted message to the clipboard or select the encrypted file.&lt;/li&gt;&#xA;&lt;li&gt;Right-click on the selected content or file, then choose &lt;em&gt;Services&lt;/em&gt; .&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Decryption 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-036.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;3&#34;&gt;&#xA;&lt;li&gt;If prompted for a passphrase, enter the passphrase for your private key. After decryption, the decrypted text will be available in the clipboard or in the output file.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Decryption 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-037.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;signing&#34;&gt;&#xA;  Signing messages in GPG Suite&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#signing&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Copy the message content you want to sign to the clipboard or select the document you want to sign.&lt;/li&gt;&#xA;&lt;li&gt;Right-click on the selected content or file.&lt;/li&gt;&#xA;&lt;li&gt;From the context menu, select &lt;em&gt;Services&lt;/em&gt; .&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Signing 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-040.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;4&#34;&gt;&#xA;&lt;li&gt;If you have more than one private key, select your private key from the list, then click &lt;em&gt;Sign&lt;/em&gt;. The signed text or file will be saved or copied to the clipboard.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Signing 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-041.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Avoid signing messages that seem universal. For example, a signed &amp;ldquo;I agree&amp;rdquo; or &amp;ldquo;It&amp;rsquo;s me&amp;rdquo; message can be saved and used to impersonate you in another conversation. Signed messages should be complete sentences describing the purpose and circumstances of the signature.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;h2 class=&#34;heading&#34; id=&#34;verification&#34;&gt;&#xA;  Verifying messages in GPG Suite&lt;span class=&#34;heading__anchor&#34;&gt; &lt;a href=&#34;#verification&#34;&gt;#&lt;/a&gt;&lt;/span&gt;&#xA;&lt;/h2&gt;&lt;ol&gt;&#xA;&lt;li&gt;Select the signed text or file you want to verify.&lt;/li&gt;&#xA;&lt;li&gt;Right-click on the selected content or file.&lt;/li&gt;&#xA;&lt;li&gt;From the context menu, select &lt;em&gt;Services&lt;/em&gt; .&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Verification 1&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-043.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Verification 2&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-044.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;ol start=&#34;4&#34;&gt;&#xA;&lt;li&gt;GPG Suite will display the verification result, informing you whether the signature is valid and who the author is.&lt;/li&gt;&#xA;&lt;/ol&gt;&#xA;&lt;p&gt;&lt;img alt=&#34;Verification 3&#34; src=&#34;https://cebulka.in/en/posts/pgp-gpgsuite/osx-045.jpg#center&#34;&gt;&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;We do not need to import the public key again when verifying subsequent signatures of the same author. The key will be saved in the program files.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;hr&gt;</description>
    </item>
  </channel>
</rss>
