When it comes to Human Rights, strong encryption can become the great equalizer.
π§ π Public Community Servers (Tor Browser Access)
[ PASTEBIN (.onion) *NEW* ] [ GITEA SERVICE (.onion) ]
π Upgrade Your Security / Privacy Game With PGP
(watch on decentralized Peertube by clicking the image below)
π½οΈ Today's video: Learn PGP in just 11 minutes of video.
Given the current political world climate + ongoing attacks on end to end encryption messengers, I felt this topic appropriate.
No matter what happens to encrypted messengers, PGP will always be there for you.
Many ways to use it, and I will continue covering different ways to use it for the community. π
Who is this for? You can use this on ANY operating system/computer.
(Even on a Pinephone: I use GPA on mine).
(Support / Extra options (including crypto) found at bottom of this post. Most of all Sharing this helps this content move up the algorithm. Thank You.)
PGP Public / Private Key Communication:
(watch video down below for demo + instruction)
Imported Public Key Verifies Signature:
Scenario: Alice writes message to Bob, signs using her private key, and Bob is able to verify it was from Alice herself, as he imported her public key into his keyring. This public / private key system (asymmetric) offers proof of signature.
Without being signed by her actual key, validation would not be proven.
FIRST STEPS: Add Contact's Public Key To Your Keyring First:
(To Communicate)
NEXT: Verify Fingerprint (see signature verification post below for more info on this process):
Watch below video to see the encryption demo + instructions on decryption process + benefits.
πΊ VIDEO TUTORIAL COVERAGE:
Write exclusive encrypted messages (only recipient can open)
Decrypt messages written exclusively for your key
Create new PGP keys
Learn how PGP provides stronger security to messengers
Learn to exchange public keys (making messages private/exclusive)
PGP allows compartmentalization of encryption from the message transport
(allowing situations such as airgap)Learn to verify signed Linux images to ensure you install safe software
Drawbacks? Some may say lack of perfect forward secrecy.
You can certainly get creative with versatile PGP!
NOTE: diagrams + screenshots found below video for your reference
π Upgrade Your Security / Privacy Game With PGP
(watch on decentralized Peertube by clicking the image below + mirrors below that)
ALTERNATIVE MIRRORS:
[ Peertube ]
[ Odysee ]
[ Bitchute ]
[ Youtube ] (scroll down to watch embedded right here in this post)
If you rather watch here on this post, video embedded below (new mirrors added later):
After watching and learning about verifying your Tails Image (or other Linux downloads), why not setup Tails USB disk to continue the process and take full advantage of PGP benefits and have confidence in your Linux setup?
Tails Persistence Encrypted USB tutorial linked down further below (the ideal way to run Tails).
You can do it! Leave comments if you get stuck.
βοΈ Full Signed Linux Image PGP Verification/Integrity Guide (if you missed it):
NEXT: MULTIPLE SUBJECTS VIDEO
First, we learn how to use symmetric ciphers in gpg to encrypt file backups to securely transfer files on email and any other platform (symmetric cipher keeps encrypted data secret except for those knowing the passphrase)
We learn to backup our PGP keys and transfer them to a new device (securely)
We learn to use scp (ssh file transfer) to transfer files directly using encrypted connection
(click image below to watch on decentralized Peertube channel or watch the embedded Youtube video below it)
Thanks for watching! π
πΏ Related Flashback: Install Tails USB Encrypted Persistence/Customization:
(since covering verifying Tails in example, this fits the post!)
These Tutorials are for everyone. Thanks for Sharing them.
Reaching people makes it worth it.
π ** Sharing links moves this content higher in algorithm. **
β€οΈ Thanks for Supporting this with π€² Shares (other Support/membership/extra options below).
βοΈ Following is FREE!). Followers get only the most interesting posts by email.
Share to help grow past the algorithm.
Tutorial Posts for everyone, sometimes share extra/custom tips with those supporting this behind the scenes.
If everyone reposts links, this channel/tutorial community will rank higher on search engines (algorithm rewards backlinks to this).
Thank you for your help in this mission.
Online safety matters. Open Comments Welcome Questions, Below.
ποΈ LINKS/SERVICES π
----------------------------------------------------------------------
π§ π GITEA SERVICE (.onion): Books, Code/Scripts, Wiki, more (make a repository)
π§ π PASTEBIN (.onion): options- password protect, zk-256bit, "Burn After Reading" + more (use Tor Browser for .onion's)
----------------------------------------------------------------------
π π€ SUPPORT π (If you like to)
π³ π EXTRAS: (bonus offers / support). Support here offers something in return - like your own privacybox: encrypted pastebin + Nextcloud Tor Hidden Service Server.
π€ π΅ CASHAPP: $HumanRightsTech
β π π Politictech Membership β€οΈ (monthly supporter option + early/extra access)
πͺ Politictech Main Page: (info + current links/addresses)
----------------------------------------------------------------------
π² FOLLOW: β¬
β π MASTODON
π¦ TWITTER
πΊ π PEERTUBE
πΊ π BITCHUTE
πΊ π ODYSEE
πΊ π YOUTUBE
---------------------------------------------------------------------
β CONTACT
-------------------------------------------------------------------------
THANK YOU for Sharing this, Liking, and Subscribing.
-------------------------------------------------------------------------
If you aren't registered for Odysee I'd love to see you over there.
Use my invite link: https://odysee.com/$invite/@RTP
--------------------------------------------------------------------------