ACKNOWLEDGMENTS |
|
xv | |
INTRODUCTION |
|
1 | (136) |
|
|
2 | (4) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (3) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Stop Wasting My Precious Time. What Do I Need to Read? |
|
|
11 | (2) |
|
1 CRYPTOGRAPHY KINDERGARTEN |
|
|
13 | (14) |
|
|
13 | (1) |
|
|
14 | (3) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Goals of PGP's Cryptography |
|
|
17 | (2) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (3) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Combining Signatures and Asymmetric Cryptography |
|
|
23 | (1) |
|
Passphrases and Private Keys |
|
|
24 | (3) |
|
|
25 | (2) |
|
|
27 | (12) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (3) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Storing Your Revocation Certificate |
|
|
36 | (1) |
|
Photo IDs and OpenPGP Keys |
|
|
36 | (1) |
|
|
36 | (3) |
|
|
37 | (2) |
|
|
39 | (14) |
|
|
40 | (1) |
|
|
40 | (5) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (2) |
|
|
45 | (1) |
|
Important Installation Locations |
|
|
46 | (1) |
|
Revocation Certificates and PGP |
|
|
46 | (5) |
|
Disabling Keyserver Updates |
|
|
47 | (1) |
|
|
48 | (1) |
|
Re-import Your Private Key |
|
|
49 | (1) |
|
|
50 | (1) |
|
Using the Revocation Certificate |
|
|
51 | (1) |
|
|
51 | (2) |
|
|
53 | (28) |
|
|
54 | (1) |
|
|
54 | (2) |
|
Calculating Checksums Under Windows |
|
|
55 | (1) |
|
Calculating Checksums Under Unix |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Installing GnuPG on Windows |
|
|
57 | (3) |
|
Command-Line GnuPG Win32 Installation |
|
|
58 | (2) |
|
Graphical GnuPG Installation |
|
|
60 | (7) |
|
|
60 | (3) |
|
Creating Keypairs in WinPT |
|
|
63 | (2) |
|
|
65 | (1) |
|
WinPT Revocation Certificate |
|
|
65 | (1) |
|
Sending Your Key to a Keyserver |
|
|
66 | (1) |
|
Installing GnuPG on Unix-like Systems |
|
|
67 | (2) |
|
|
67 | (2) |
|
Building from Source Code |
|
|
69 | (3) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Command-Line GnuPG Keypairs |
|
|
72 | (4) |
|
GnuPG Revocation Certificates |
|
|
76 | (2) |
|
|
78 | (3) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (10) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (5) |
|
Signing Keys of Friends and Family |
|
|
84 | (1) |
|
|
85 | (2) |
|
What to Do with Signed Keys |
|
|
87 | (1) |
|
When You Get New Signatures |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Avoiding the Web of Trust |
|
|
90 | (1) |
|
|
91 | (8) |
|
|
91 | (2) |
|
Adding Keys to Your Keyring |
|
|
93 | (4) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Adding Photos to Your Keys |
|
|
98 | (1) |
|
|
99 | (16) |
|
|
99 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
Adding Keys to Your Keyring |
|
|
101 | (4) |
|
Command-Line Key Fetching |
|
|
102 | (1) |
|
|
102 | (2) |
|
WinPT Key Viewing and Fetching |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (4) |
|
|
105 | (1) |
|
Signing Keys on the Command Line |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Pushing Signatures to Keyservers |
|
|
108 | (1) |
|
|
109 | (1) |
|
Deleting Public Keys from Your Keyring |
|
|
109 | (1) |
|
|
110 | (3) |
|
Adding Photos to Your Key |
|
|
110 | (1) |
|
Viewing Photos with GnuPG |
|
|
111 | (1) |
|
|
112 | (1) |
|
Building the Web of Trust with GnuPG |
|
|
113 | (2) |
|
|
113 | (1) |
|
|
113 | (1) |
|
Command-Line Trust Configuration |
|
|
113 | (1) |
|
WinPT Trust Configuration |
|
|
114 | (1) |
|
|
115 | (10) |
|
|
16 | (102) |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Saving EmailEncrypted or Not? |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Email from Beyond Your Web of Trust |
|
|
120 | (2) |
|
Expanding Your Web of Trust |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (2) |
|
Unprotected Email Components |
|
|
124 | (1) |
|
|
125 | (12) |
|
PGP and Your Email Client |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (11) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Mailing List Admin Requests |
|
|
129 | (1) |
|
|
130 | (2) |
|
Sample Custom Policy: Exceptions to Default Policy |
|
|
132 | (2) |
|
Sample Custom Policy: Overriding the Defaults |
|
|
134 | (1) |
|
Custom Policies Order and Disabling Policies |
|
|
134 | (3) |
10 GNUPG AND EMAIL |
|
137 | (18) |
|
Microsoft Mail Clients and GnuPG |
|
|
138 | (1) |
|
Outlook Express and GnuPG |
|
|
138 | (3) |
|
Configuring Outlook Express for OpenPGP |
|
|
139 | (1) |
|
|
140 | (1) |
|
Receiving and Verifying Signed and Encrypted Mail |
|
|
141 | (1) |
|
|
141 | (4) |
|
|
142 | (1) |
|
|
142 | (3) |
|
|
145 | (1) |
|
|
145 | (1) |
|
Decrypting PGP/MIME Messages with Microsoft Mail Clients |
|
|
145 | (2) |
|
|
147 | (9) |
|
Installing the Thunderbird GnuPG Plug-In |
|
|
147 | (1) |
|
|
147 | (2) |
|
|
149 | (2) |
|
|
151 | (1) |
|
Upgrading Thunderbird and Enigmail |
|
|
152 | (3) |
11 OTHER OPENPGP CONSIDERATIONS |
|
155 | (12) |
|
|
156 | (5) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
OpenPGP and Shared Systems |
|
|
163 | (1) |
|
|
164 | (4) |
|
|
164 | (1) |
|
|
165 | (2) |
A INTRODUCTION TO POP COMMAND LINE |
|
167 | (10) |
|
PGP Command Line Configuration |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
Setting an Expiration Date |
|
|
170 | (1) |
|
Generating Revocation Certificates |
|
|
171 | (1) |
|
Exporting Your Public Key |
|
|
171 | (1) |
|
|
172 | (1) |
|
Managing PGP Command Line Keyrings |
|
|
173 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Updating Keys on a Keyserver |
|
|
175 | (1) |
|
Encryption and Decryption |
|
|
175 | (3) |
|
|
176 | (1) |
B GNUFG COMMAND LINE SUMMARY |
|
177 | (6) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Keypair Creation, Revocation, and Exports |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Sending a Key to a Keyserver |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Encryption and Decryption |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
INDEX |
|
183 | |