PGP is short for
Pretty Good Privacy. It is encryption for the
private things you want to keep that way and about as good as it gets for us,
the peasant masses down trodden as we are by corrupt governments milking us for
all we are worth. Sadly things do not work as they should have done. But we have
chance. Germans have produced GPG, which uses the same
mathematical advances while still being open source. This means you can read the
source code for yourself to see if there are any back doors for government spies
to abuse. That is as good as it gets in this foul Year of Our Lord. 2013. Use it
to send you emails that you want to keep private. You also need good pass phrases. A password is nowhere good enough. Some good
approaches come from the
University of Texas. Then find out about TOR.
PS Der Spiegel gets us up to date [ in 2015 ] with Inside The NSA Attacks On Internet Security. It recommends Zoho, TOR, TrueCrypt, Off-the-Record for encrypting instant messaging as strong. The best is a combination of Tor, another anonymization service, the instant messaging system CSpace and a system for Internet telephony (voice over IP) called ZRTP. This type of combination results in a "near-total loss/lack of insight to target communications, presence,".
ZRTP, which is used to securely encrypt conversations and text chats on mobile phones, is used in free and open source programs like RedPhone and Signal. PGP continues to be developed and various versions are available today. The most widely used is GNU Privacy Guard (GnuPG), a program developed by German programmer Werner Koch.
My GPG Key is down at the bottom.
Misdirecting An Enemy
Lots of encrypted rubbish makes it difficult for them.
MIT Public Key Registry
MIT has a list of public keys. You can add yours to it.
The NSA, Crypto AG And Fraud
They cheat. It is that simple. Breaking encryption by purely technical means is much more difficult. That is why they have lots of men with heavy duty qualifications in maths, especially number theory. Being able to break in is quicker and easier.
Louis Freeh Spies on Bill Clinton; How to Exploit the Hole in PGP, by J. Orlin Grabbe
Has more on other aspects of keeping YOUR data to yourself.
Window Version of GPG
The Linux version of PGP has been ported over to Windows. It runs on Vista, the new version of Windows that has the compatibility problems built in to screw you. It is open source and subject to checking by anyone with time and a good background. AND it is a freebie. Get it while you can from:-
then make sure that you have a good copy with a signature from:-
PGP Encryption Beats Criminal Investigators So It Is Back To Basics And Torture [ 10 February 2008 ]
BURLINGTON, Vt. (AP) When Sebastien Boucher stopped at the U.S.-Canadian border, agents who inspected his laptop said they found files containing child pornography [ but they lied - Editor ].......... Now Boucher is caught in a cyber-age quandary: The government wants him to give up the password, but doing so could violate his Fifth Amendment right against self-incrimination by revealing the contents of the files.
Can Secret Squirrel, the NSA, GCHQ et cetera break PGP? The answer to that question is classified TOP SECRET or higher. They would probably claim that their bullying and intimidation is not torture. Boucher was guilty as Hell.
MPs Told Not To Use PGP Encryption [ 4 March 2009 ]
MPs have been told that although they are free to install PGP on their parliamentary machines the technology is not compatible with Parliament’s remote access software, making its use impractical.
MPs are being lied to. The implication is that PGP works too well for government spies to break. This is good news for everyone if it is right.
My GPG Key
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2
-----END PGP PUBLIC KEY BLOCK-----
& omissions, broken links,
cock ups, over-emphasis, malice [ real or imaginary ] or whatever; if
you find any I am open to comment.
Email me at Mike Emery. All financial contributions are cheerfully accepted. Home
Updated on Sunday, 01 January 2017 18:27:27