this post was submitted on 17 Jul 2024
-26 points (19.0% liked)

Privacy

32167 readers
229 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
-26
submitted 4 months ago* (last edited 4 months ago) by RatoGBM to c/[email protected]
 

Cunningham Law (backfired terribly)

Can someone please explain why PGP is needs all of these? All explanations of public key encryption mention any email embedded emails.

And I probably don't completely understand what PGP is, so please give me a good article or video on it.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 14 points 4 months ago* (last edited 4 months ago) (4 children)

PGP = Pretty Good Privacy. It’s both a company and the original product released by Phil Zimmerman that has since been mostly replaced by Gnu Privacy Guard (GPG).

These products create paired secret keys using the ciphers of your choice. You make the public key available to the public and keep the private key for yourself.

Then, you can either sign or encrypt some content with your private key, and anyone with your public key can validate that it was you who signed or encrypted the file.

You can also use someone else’s public key to encrypt a file, and then only the holder of the paired private key can decrypt it. And they can use your public key to validate that it was you who encrypted it.

Email addresses are optional, but can be embedded in the keypair. This means that someone else can verify that that address is linked with the identity of that keyholder, which assists in getting encrypted content to the right recipient, validates any signed/encrypted email sent from that address, and provides a memorable link to the public key’s owner.

[–] RatoGBM 2 points 4 months ago* (last edited 4 months ago) (3 children)

So the email and name will be plaintext in the public key/signatures?

memorable link to the public key’s owner.

Ok, just strange how the key generator insists on specifying them. Encryption usually doesn't like extra metadata.

[–] [email protected] 6 points 4 months ago* (last edited 4 months ago) (2 children)

Its about trusting the data you're decrypting actually came from who you think it came from.

So the data is signed with your public key, and your public key is published so people can verify the other stuff you publish. Your email is there just so people can communicate back to you...

You can of course put junk info in the fields if you want, but the purpose of the program is enabling trustworthy lines of communication.

[–] RatoGBM -1 points 4 months ago

So the email and username have no cryptographic purpose, they are just there for convenience.

Thanks I guess...

load more comments (1 replies)
load more comments (1 replies)
load more comments (1 replies)