News
To encrypt email and files, you need to know how to work with PGP keys. Get up to speed on generating, exporting, and importing encryption keys with GnuPG.
GnuPG, the open replacement for PGP, ... It makes no difference to GPG what type of file you are encrypting; it can be binary just as well as text, or an OpenOffice.org spreadsheet.
Hi. I've just begun using PGP at the behest of the IT security people here at school, and they've got a keyserver running on LDAP protocol on campus that I'd like to be able to use. Unfortunately ...
In GnuPG and PGP, there are mechanisms for validating keys, but it's up to you to use them. These mechanisms comprise the Web of Trust. The Web of Trust. The Web of Trust isn't hard to understand. If ...
We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past.
We'll publish critical vulnerabilities in PGP/GPG and S/MIME email encryption on 2018-05-15 07:00 UTC. They might reveal the plaintext of encrypted emails, including encrypted emails sent in the past.
In the meantime, users of PGP/GPG and S/MIME are being advised to immediately disable and/or uninstall tools that automatically decrypt PGP-encrypted email, and seek alternative end-to-end ...
If you're still using 32-bit PGP keys, you only think you have security. But you really don't. It would take a cracker about four seconds to forge your PGP signature.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results