No edit summary |
m (→Quick Start Guides: Updated links) |
||
Line 14: | Line 14: | ||
== Quick Start Guides == | == Quick Start Guides == | ||
* [[ | * [[Security_Guide/UsingGpg/CreatingKeys| Creating GPG keys]] | ||
Using GPG with email clients: | Using GPG with email clients: | ||
* [[ | * [[Security_Guide/UsingGpg/WithEvolution| Evolution]] | ||
* [[ | * [[Security_Guide/UsingGpg/WithKmail| Kmail]] | ||
* [[ | * [[Security_Guide/UsingGpg/WithPine| Pine]] | ||
* [[ | * [[Security_Guide/UsingGpg/WithThunderbird| Mozilla Thunderbird]] | ||
Using GPG with webmail email clients: | Using GPG with webmail email clients: | ||
* [[ | * [[Security_Guide/UsingGpg/WithFireGPG| FireGPG and Google's Gmail]] | ||
== Official GPG Links == | == Official GPG Links == |
Revision as of 18:34, 27 May 2008
Chapter 4, Section 2 - Using the GNU Privacy Guard (GnuPG/GPG)
GPG is used to identify yourself and authenticate your communications, including those with people you don't know. GPG allows anyone reading a GPG-signed email to verify its authenticity. In other words, GPG allows someone to be reasonably certain that communications signed by you actually are from you. GPG is useful because it helps prevent third parties from altering code or intercepting conversations and altering the message.
To participate in any part of the Fedora Project,
- You must have a GPG key pair.
- Your public key must be available on pgp.mit.edu.
Quick Start Guides
Using GPG with email clients:
Using GPG with webmail email clients:
Official GPG Links
About Public Key Encryption
4.1 LUKS Disk Encryption | Table of Contents | 4.3 7-Zip Encrypted Archives |