An Eyeful of gnuPG

Поделиться
HTML-код
  • Опубликовано: 27 дек 2024

Комментарии • 32

  • @CyberGizmo
    @CyberGizmo  Год назад +18

    I hope this wasn't a senior moment: For asymmetric keys: the Public Key is used to encrypt, the Private Key is used to decrypt

    • @nafaabout
      @nafaabout Год назад

      Nice catch, as I'm starting to think how on earth I'd use the Asymmetric method to enc/dec reports I'm going to send to the user through email if I have to hold the private key to be able to encrypt. How would I manage millions of keys for my users on my servers for this to work. Your message removes the confusion. Thank you

    • @edwardmacnab354
      @edwardmacnab354 22 дня назад

      Seniors don't actually have Seniors Moments . It is young people whose cockiness at 18 begins to fade with the gradual realization that they indeed do not know everything and that they are in fact , not cool anymore as an even younger generation is hot on their heels , who use the phrase to deflect .------- You yourself give out YOUR public key for all to see but you encrypt with your private key . People who want to message YOU do so by encrypting their message with YOUR PUBLIC KEY , which you then decrypt using your PRIVATE KEY . YOU YOURSELF encrypt using your PRIVATE KEY and people who have your PUBLIC KEY can decrypt it . If you want only one person to be able to message with you ,only give your public key to them. They encrypt with your public key , you decrypt with your private key . You encrypt with your Private key , They decrypt with your Public key . Please correct me if I'm wrong .

  • @georgehope5477
    @georgehope5477 Год назад +1

    Thank you sir.

  • @nafaabout
    @nafaabout Год назад +1

    This just came in the perfect time for me. I'm adding a feature to the app I'm working on to encrypt a generated PDF using GPG key before emailing it to the user. Thank you.

    • @nafaabout
      @nafaabout Год назад

      @DJ Ware what I understand from your video is that the Asymmetrical encryption can be only done using the private key then the receiver can use the public key to decrypt the document. So, I'd like to know if it's a viable approach to use this method to encrypt those PDF reports before sending them to user using Asymmetric method. In this scenario, I suppose we'd have to generate a key-pair for each user on our servers, then use those keys to encrypt the PDF. We would then show the Public key to the user in their settings page. They will then be able to use that public key to decrypt the PDF.
      I believe the issue that would come with this method is how to manage hundreds of thousands of GPG keys or even millions on the server side keyring.
      So, what would you propose for this to be scalable and easier to do while being secure.

  • @DrZingo_
    @DrZingo_ Год назад +5

    19:05 Isn't it the other way around. Public key to encrypt, private key to decrypt.
    I think signing is the way you described.
    Great video anyway, I always learn something from them.

    • @CyberGizmo
      @CyberGizmo  Год назад +4

      I put a pinned comment in to correct this if I had a senior moment. Signatures is true, except Microsoft reverses the order on their web services...just because they have to do it backwards like they do everything else :D

  • @c1ph3rpunk
    @c1ph3rpunk Год назад +8

    I’ve been using PGP since the original incarnation, and use GPG quite a bit. It’s still complicated.

    • @Ancipital_
      @Ancipital_ Год назад

      Why? Four applications, two of which (sign and decrypt) require a private key (insert password), two of which (verify and encrypt) don't.

  • @y2b5
    @y2b5 4 месяца назад

    Thank you so much for creating this lecture.

  • @adjusted-bunny
    @adjusted-bunny Год назад +2

    Informative video, as always.

  • @TheYoungtrust
    @TheYoungtrust Год назад +2

    Thanks for going over this. I've used this to generate keys for 3rd parties, but I've never really learned how to use it. Do you prefer zsh or did it come with your kde setup?

    • @CyberGizmo
      @CyberGizmo  Год назад +1

      Prefer it and you are welcome

  • @CrsAVC
    @CrsAVC Год назад

    Great video ty very much, I was hoping it would include the new ADSK feature, I've seen no other video approaching it...

  • @moeabdol_
    @moeabdol_ Год назад +1

    Excellent tutorial. Thank you for sharing @CyberGizmo

  • @Govellius
    @Govellius Год назад +2

    I've used gpg for years and i still get confused. I thought async used the public key to encrypt and the private key to decrypt. That way you need a private key to access the file

    • @CyberGizmo
      @CyberGizmo  Год назад +2

      That is correct, public key encrypts, private key decrypts

  • @oskar4437
    @oskar4437 Год назад

    wonderful thumbnail for this video ! do you have a link for that desktopwallpaper? love it too !

    • @CyberGizmo
      @CyberGizmo  Год назад

      I made it, and sorry I do not have a public link to it yet, may do that in the future if enough people are interested

  • @gotoastal
    @gotoastal Год назад

    Thoughts on Sequoia (Rust) for PGP?

  • @monochrome_linux
    @monochrome_linux Год назад

    AI generated thumbnail? 🤔 looks pretty cool

    • @CyberGizmo
      @CyberGizmo  Год назад +1

      Partially, yes, just the image part, I did the text part and thanks

  • @JohnnieWalkerGreen
    @JohnnieWalkerGreen Год назад

    Well, "Only from You" actually means "Anyone who has access to your private part."

  • @rashie
    @rashie Год назад

    👍👍

  • @TheHackysack
    @TheHackysack Год назад

    DJ? Where?

  • @guilherme5094
    @guilherme5094 Год назад

    👍

  • @medic2299
    @medic2299 Год назад +1

    Incorrect with respect to asymmetric messages
    I can only encrypt a message to YOU using YOUR public key
    You decrypt it with YOUR private key

    • @CyberGizmo
      @CyberGizmo  Год назад

      Pinned comment posted day of the video addressed already corrected that mistake