feat/add-openpgp-workshop #1
|
@ -66,7 +66,8 @@ developed by Phil Zimmermann in the 1990s.
|
|||
* `man gpg`
|
||||
* **THESE FOLLOWING KEYS WILL NOT BE SECURE, DO NOT USE THEM FOR ANYTHING OTHER THAN THIS EXERCISE!**
|
||||
* Generate keypair: `gpg --expert --full-gen-key`
|
||||
* 1, 4096, Enter (3072), Enter (0), y, "Test Key", "fired.if.use@this.key", Enter (""), O, "password1"
|
||||
* 1, 4096, Enter (3072), Enter (0), y, "Test Key", <your_email>, Enter (""), O, "password1"
|
||||
* Use a unique email otherwise you will have issues with the exercise that follows
|
||||
* During generation, **mash input devices for added entropy**
|
||||
|
||||
---
|
||||
|
@ -91,7 +92,7 @@ developed by Phil Zimmermann in the 1990s.
|
|||
* `gpg --export --armor <email/ID> > <name>.asc`
|
||||
* `gpg --import <name>.asc`
|
||||
|
||||
* Task: pair up and exchange your keys, then encrypt data to each other
|
||||
* Task: pair up and exchange your keys, encrypt data to each other, then decrypt the message so you can tell your partner the contents of the message
|
||||
* Tip: you may encrypt the data to multiple people
|
||||
|
||||
---
|
||||
|
|
Loading…
Reference in New Issue