Who uses PGP when corresponding with sources?

Who uses PGP when corresponding with sources?

  • Always

    Votes: 0 0.0%
  • Most of the time

    Votes: 0 0.0%
  • Sometimes

    Votes: 6 66.7%
  • Never

    Votes: 3 33.3%

  • Total voters
    9
What do you think is the easiest way to use PGP/GPG?

I've been trying some of the browser extensions like Mailvelope. Implementation is as easy as installing any other extension.

Email is an antiquated way to communicate. It's important to find something which can encrypt both PMs and email.

The guide I wrote is based upon Gpg4win - Secure email and file encryption with GnuPG for Windows. It was written between Febuary and March of this year. I advised people to share their RSA keys then encrypt emails and PMs via gpg4win's clipboard feature. After encrypting the message in gpg4win, copying and pasting the encrypted text to PM and sending it to the intended recipient. This has the benefit of keeping key management and message writing away from the browser and using gpg itself as opposed to openpgpjs.

Most people who use gpg use enigmail + thunderbird. https://www.enigmail.net/home/index.php

I've been watching a similar plugin for a while https://webpg.org/. I've been hoping the developers would iron out all of the bugs and get it running smoothly. It allows inline encryption/decryption anywhere on the web, works with firefox, and uses gpg itself instead of openpgpjs. Every time I give it a shot it's got different problems.

I played with mailvelope prior to writing the gpg4win guide back in February. At that time, it had numerous criticisms:
http://cure53.de/pentest-report_mailvelope.pdf

I try to stay away from chrome, so I've been waiting for the firefox version. Mailvelope's developers are responsive to criticism and they are actively developing mailvelope.

https://github.com/toberndo/mailvelope/blob/master/Changelog.md

I installed it and played with it a bit. It looks like it will do the job of encrypting emails and PMs very easily. It may not be perfect, but it's superior to not using it. At this time it looks like a viable solution. I'll write a guide for it when I have time.
 
I tend to use PGP with sensitive work and all, but sometimes I wonder if I'm too damn loose tongued where it counts, like on privates messages here. No such thing as a truly private message on a forum, right? Even if it was encrypted, the site would have the password. I know Millard's hands are as safe as safe goes and nobody gives an ass about my aas use, but still, stupid habits in retrospect. :cool:

There are administrators in this community who have been caught reading users PMs.

Fuzo and baby1 are shady - Page 3

You need to choose the boards you decide to participate on carefully. Millard is one of the good guys.
 
There are administrators in this community who have been caught reading users PMs.

Fuzo and baby1 are shady - Page 3

You need to choose the boards you decide to participate on carefully. Millard is one of the good guys.

Thanks, Regular!

Members should never trust PMs for exchanging sensitive information. I warnedmembers over six years ago about unscrupulous administrators of vbulletin-based forums who could install a readily available hack and have access to everyone's PMs. MESO, as was the case then, still has no interest in compromising the privacy of member PMs:

Unscrupulous Admins of any vbulletin-based message board can read member PMs if they install a simple hack.

MESO does not do this and never has.

I do not know if there is a way to detect whether a given vbulletin forum has this hack installed. Therefore, I recommend that you NEVER disclose any sensitive information in PMs. Always assume someone else is reading your PMs.

For further information, see:

Read PMs - vBulletin.org Forum
 
Email is an antiquated way to communicate. It's important to find something which can encrypt both PMs and email.

The guide I wrote is based upon Gpg4win - Secure email and file encryption with GnuPG for Windows. It was written between Febuary and March of this year. I advised people to share their RSA keys then encrypt emails and PMs via gpg4win's clipboard feature. After encrypting the message in gpg4win, copying and pasting the encrypted text to PM and sending it to the intended recipient. This has the benefit of keeping key management and message writing away from the browser and using gpg itself as opposed to openpgpjs.

Most people who use gpg use enigmail + thunderbird. https://www.enigmail.net/home/index.php

I've been watching a similar plugin for a while https://webpg.org/. I've been hoping the developers would iron out all of the bugs and get it running smoothly. It allows inline encryption/decryption anywhere on the web, works with firefox, and uses gpg itself instead of openpgpjs. Every time I give it a shot it's got different problems.

I played with mailvelope prior to writing the gpg4win guide back in February. At that time, it had numerous criticisms:
http://cure53.de/pentest-report_mailvelope.pdf

I try to stay away from chrome, so I've been waiting for the firefox version. Mailvelope's developers are responsive to criticism and they are actively developing mailvelope.

https://github.com/toberndo/mailvelope/blob/master/Changelog.md

I installed it and played with it a bit. It looks like it will do the job of encrypting emails and PMs very easily. It may not be perfect, but it's superior to not using it. At this time it looks like a viable solution. I'll write a guide for it when I have time.

Great advice and information! Where was your original Gpg4win guide published (link please)? I look forward to the next guide.

I hope more and more members start using PGP/GPG and encourage those in their circles to do the same. Members may think they have nothing to hide but the truth is that everyone SHOULD have something to hide. Privacy is important.
 
Thanks, Regular!

Members should never trust PMs for exchanging sensitive information. I warnedmembers over six years ago about unscrupulous administrators of vbulletin-based forums who could install a readily available hack and have access to everyone's PMs. MESO, as was the case then, still has no interest in compromising the privacy of member PMs:

I suppose it depends on what board someone is on. I've received reports of an administrator stealing payment information sent via PM. In contrast, I know PillarofBalance, Mugzy, Basskiller, and you refuse to read PMs under any circumstances.

I trust the administrators of the boards I participate on more than I trust the administrators who operate the email services we use. That being said, I come from a place where servers are seized and administrators are arrested frequently. Data centers can usually be compelled to mirror or wiretap a server. Even if I trust the administrators of the boards I'm on, I usually don't trust their hosting providers.

I don't see how using gpg to encrypt an email or PM is any more risky than the other. Unencrypted I'd generally give the advantage to email because there are shady administrators on BB boards out there. I've heard a lot of reports of people with weak safe-mail passwords getting scammed though.

Great advice and information! Where was your original Gpg4win guide published (link please)? I look forward to the next guide.

I hope more and more members start using PGP/GPG and encourage those in their circles to do the same. Members may think they have nothing to hide but the truth is that everyone SHOULD have something to hide. Privacy is important.

I hope board owners start forcing or at least allowing https browsing and push for the use of gpg in email and PM. I'll write the guide for mailvelope and post it around but who knows if anyone will actually use it despite the benefits. Security is typically an afterthought for most people when it should be a process which is methodically implemented. I've seen a lot of people go to jail who "wigned it" so to speak.

Below is the guide I wrote. I originally posted it over at steroidinsight.com. It may have been lost when we moved over to ugbodybuilding.com.
 
Last edited:
The intent of this illustrated guide is to introduce people to Pretty Good Privacy who do not have experience with it and walk them step by step through the process of sending private messages to one another. PGP enables someone to send encrypted messages to other people who know how to use it. PGP makes your communications much safer than if you sent them unencrypted. This guide will focus on the gpg4win software bundle which is free. The guide may seem long but that's only because there are so many photos and each step is laid out. It takes about five mins to stetup the application and create an encryption key.

General concept of public key encryption:
PGP users have a pair of keys. One key is public and the other key is kept private. You don't use your public key to encrypt messages to other people. Only the person with the matching private key can decrypt the message. If you encrypt something with your public key only your private key can decrypt it. You need the public key of the person you want to send the message to. You encrypt messages with their public key and then only their private key can decrypt the message.

1: Download gpg4win
Get it here: http://files.gpg4win.org/gpg4win-2.1.0.exe
For more details about this software visit Gpg4win - Secure email and file encryption with GnuPG for Windows.

2: Install the program

2A: When you start the installation uncheck "Kleopatra" and instead check "GPA" as shown below
http://pix.defcon5.biz/files/11177115362234707791.png

2B: In order to continue the installation you must check the box shown below
http://pix.defcon5.biz/files/89265469970574055188.png

3: Generate a new private and public key

3A: The first time you start GPA you will be greeted with this box. Select "Generate Key Now."
http://pix.defcon5.biz/files/20602416286140100152.png

3B: Enter your nickname
http://pix.defcon5.biz/files/71905495591374664512.png

3C: You can enter your email address if you'd like people who receive your public key to have your email address. I prefer to name the key after the site I'm using the key on.
http://pix.defcon5.biz/files/18490152423863696307.png

3D: Enter your password. It is important to use a password which is exceptionally difficult to guess. This is the procedure NASA uses to choose passwords: "Your passphrase should have sufficient information entropy. We suggest that you include five words of 5-10 letters in size, chosen at random, with spaces, special characters, and/or numbers embedded into words. You need to be able to recall the passphrase that was used to encrypt the file."
http://pix.defcon5.biz/files/18214273145401649992.png

3E: Your public and private key pair has been created.
http://pix.defcon5.biz/files/86606731655697967300.png

4: Giving someone your public key so they can encrypt messages and files they intend to send to you.

4A: Highlight your key, right click it, and select "Copy"
http://pix.defcon5.biz/files/48980944058880569674.png

4B: Right click and press paste to paste your public key. Here's the public encryption key I made for this guide:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.17 (GNU/Linux)
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=DCGN
-----END PGP PUBLIC KEY BLOCK-----

5: How to use someone's public key to send them an encrypted message.

In the example below Alice will be sending me an encrypted message and her public encryption key. She sends me her public encryption key in the message so I can reply to her with an encrypted message.

5A: Alice needs to copy and paste my public key to a text editor like notepad. Then she saves my public key as regular.public.key.txt.
http://pix.defcon5.biz/files/24369574151891033199.png
http://pix.defcon5.biz/files/96269078835515130768.png

5B: Alice needs to import my public key into GPA by pressing the "import keys" button.
http://pix.defcon5.biz/files/60915836567728417505.png

5C: Alice then selects my public key which was saved to the desktop as "regular.public.key.txt"
http://pix.defcon5.biz/files/93312969387247005835.png

5D: Alice has added my public encryption key to GPA and she can now send me encrypted messages.
http://pix.defcon5.biz/files/08946367888813218364.png

5E: Alice needs to copy her public key so she can send it to me in the message she's about to write.
http://pix.defcon5.biz/files/69280022004331939316.png

5F: Alice opens the "clipboard" in GPA. This is where text is encrypted in GPA.
http://pix.defcon5.biz/files/11543534945321342282.png

5G: Alice types me a message and then pastes her public encryption key to the clipboard. The second photo is what the final message looks like.
http://pix.defcon5.biz/files/90062689118382475553.png
http://pix.defcon5.biz/files/36792816167395735267.png

5H: Alice then selects the encrypt button on the clipboard
http://pix.defcon5.biz/files/96877105127879000930.png

5I: A box comes up with the public keys Alice has added to GPA. Since she's sending a message to me she chooses my public encryption key.
http://pix.defcon5.biz/files/48118463067971478402.png

5J: GPA now encrypts whatever was written on the clipboard with my public encryption key.
http://pix.defcon5.biz/files/26184758256166096723.png

Below is the encrypted message Alice sent me:

-----BEGIN PGP MESSAGE-----
Version: GnuPG v2.0.17 (MingW32)
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=3KiB
-----END PGP MESSAGE-----

6: How do I read the message Alice sent me?

6A: I open GPA and select the clipboard.
http://pix.defcon5.biz/files/99108694272474335311.png

6B: I paste the message Alice PMed me and hit the decrypt button.
http://pix.defcon5.biz/files/61191534531729928573.png

6C: I enter my password and the message is decrypted.
http://pix.defcon5.biz/files/73691861929761036989.png

Below is the decrypted message Alice sent me:

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Alice here, I'd like to share some sensitive information with you regular.

Below is my public encryption key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.17 (MingW32)
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=cNuC
-----END PGP PUBLIC KEY BLOCK-----


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The intent of this illustrated guide is to introduce people to Pretty Good Privacy who do not have experience with it and walk them step by step through the process of sending private messages to one another. PGP enables someone to send encrypted messages to other people who know how to use it. PGP makes your communications much safer than if you sent them unencrypted. This guide will focus on the gpg4win software bundle which is free. The guide may seem long but that's only because there are so many photos and each step is laid out. It takes about five mins to stetup the application and create an encryption key.

Thanks, Regular! Good instructions. I encourage everyone to take the time to implement PGP/GPG in your communications.
 
I hope board owners start forcing or at least allowing https browsing and push for the use of gpg in email and PM. .

This is something that I plan on looking into more seriously in the future. I am not familiar with the technical aspects of doing this with vbulletin and am very concerned about the SEO implications as well.
 
I only use a (legit and paid for) VPN to get gear (and, generally, to use the entire internet). However, I run TAILS and obviously use PGP when the discussion is about...I'd tell you, but I'd have to encrypt it ;)

edit: Wow, forgot the reason I wanted to post in the first place. I THINK TOP SOURCES IN THIS FORUM SHOULD IMPLEMENT PGP ASAP, and hopefully others will follow.
 
Last edited:

Sponsors

Latest posts

Back
Top