OpenPGP: How to Protect Everything with Pretty Good Privacy
Encryption software called the Pretty Good Privacy or PGP cryptosystem has been available since the year 1991, and it has only become more important over time. Since it’s a general purpose cryptosystem instead of a single product, you can use PGP for simple tasks like password-protecting files or for building your own complex security protocols. Today, practically every computing device from laptops to mobile phones have compatible apps based on the completely free OpenPGP specification, so there’s little reason not to take advantage of the incredible power they provide. This workshop will show you how to make use of this vital capability, going well beyond protecting email conversations to showcase techniques like pseudonymous identity creation, subkey editing, authentication of messages and files via digital signatures, and more.
Attend the next workshop(s).
Did you know that the technology Edward Snowden used to safely get in touch with journalists was available more than two decades before he blew the whistle on the NSA’s global surveillance and domestic spying campaigns? Way back in 1991, Phil Zimmerman released a program called Pretty Good Privacy, or PGP for short, setting the bar for almost every other “end-to-end encrypted messaging” tool for the next twenty years. Today, this same technology is freely available as the OpenPGP standard, and it’s what companies like Keybase and ProtonMail built their own privacy-enhancing products with.
There is OpenPGP-compatible free software for practically every electronic device and platform, making it arguably the most ubiquitous and most important digital privacy tool ever created. Maybe you’ve already heard about it in the context of “encrypted email,” but did you know that you can also use PGP to add encryption to services and Web sites that don’t already have it? For example, you can use PGP to keep your Twitter or Instagram DMs private. But wait, there’s more! You can use it to password-protect files so that Google or Dropbox can’t read them. You can use PGP to detect spoofed messages, inauthentic files, and corrupted downloads. Since OpenPGP was designed to be a generic cryptosystem capable of protecting arbitrary information, you can even use it to devise more complex secure sharing scenarios like requiring two (or more!) people to act in unison before they can take an action, almost like turning the keys to activate a missile launch.
In this workshop, the Tech Learning Collective’s cybersecurity instructors will help you get up and running with OpenPGP on (almost) any computer you’re using, including handheld devices. You’ll have the opportunity to practice generating keys, encrypting messages in both symmetric and assymetric schemes, and verifying digital signatures. By the end of the workshop, you’ll understand not only how PGP works, but how to use it to work through almost any digital privacy problem you will ever encounter.
Upcoming “OpenPGP: How to Protect Everything with Pretty Good Privacy” Events
Subscribe to our calendar.
(Not currently scheduled.)