<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://commons.thefnf.net/index.php?action=history&amp;feed=atom&amp;title=Pgp</id>
	<title>Pgp - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://commons.thefnf.net/index.php?action=history&amp;feed=atom&amp;title=Pgp"/>
	<link rel="alternate" type="text/html" href="https://commons.thefnf.net/index.php?title=Pgp&amp;action=history"/>
	<updated>2026-05-06T15:15:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://commons.thefnf.net/index.php?title=Pgp&amp;diff=546&amp;oldid=prev</id>
		<title>75.87.178.144 at 01:54, 22 December 2010</title>
		<link rel="alternate" type="text/html" href="https://commons.thefnf.net/index.php?title=Pgp&amp;diff=546&amp;oldid=prev"/>
		<updated>2010-12-22T01:54:31Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 01:54, 22 December 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;PGP stands for &amp;#039;pretty good privacy,&amp;#039; and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoever. What it does require, however, is your own keypair, an understanding of how public key encryption works, and the software to make it all run. Most PGP software will take care of key generation for you, so let me skip to instructions on usage.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;PGP stands for &amp;#039;pretty good privacy,&amp;#039; and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoever. What it does require, however, is your own keypair, an understanding of how public key encryption works, and the software to make it all run. Most PGP software will take care of key generation for you, so let me skip to instructions on usage.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A keypair, as you might imagine, consists of two separate keys. The first is called the private key, and allows whoever possesses it to DECRYPT &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;message&lt;/del&gt;. The second is called the public key, and allows whoever possesses it to ENCRYPT messages. So, a person generates their very own keypair, and distributes their public key in whatever way they find appropriate (usually by putting it onto a keyserver such as pgp.mit.edu). This way, anybody can encrypt a message so that only &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;they are &lt;/del&gt;able to decrypt it.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A keypair, as you might imagine, consists of two separate keys. The first is called the private key, and allows whoever possesses it to DECRYPT &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;messages&lt;/ins&gt;. The second is called the public key, and allows whoever possesses it to ENCRYPT messages. So, a person generates their very own keypair, and distributes their public key in whatever way they find appropriate (usually by putting it onto a keyserver such as pgp.mit.edu). This way, anybody can encrypt a message so that only &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;the intended recipient is &lt;/ins&gt;able to decrypt it.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Now, Let&amp;#039;s say that cypherpunk A wants to send a message to cypherpunk B, but he doesn&amp;#039;t want it to get read by intelligence agent #1. If both A and B have encryption keys, they are in luck. All that A has to do is write her message (on a computer that hasn&amp;#039;t already been hacked by the intelligence agent) and tell her encryption software to encrypt it using B&amp;#039;s public key. This message can now be sent via the public network without fear of ISP/Telecom/Government scrutiny.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Now, Let&amp;#039;s say that cypherpunk A wants to send a message to cypherpunk B, but he doesn&amp;#039;t want it to get read by intelligence agent #1. If both A and B have encryption keys, they are in luck. All that A has to do is write her message (on a computer that hasn&amp;#039;t already been hacked by the intelligence agent) and tell her encryption software to encrypt it using B&amp;#039;s public key. This message can now be sent via the public network without fear of ISP/Telecom/Government scrutiny.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Luckily PGP software can take care of this process as well, maintaining a list of recipients for whom public keys are known, and using them automatically when they are the recipient of a message.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Luckily PGP software can take care of this process as well, maintaining a list of recipients for whom public keys are known, and using them automatically when they are the recipient of a message&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;. There are PGP plugins for virtually every popular mail application&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>75.87.178.144</name></author>
	</entry>
	<entry>
		<id>https://commons.thefnf.net/index.php?title=Pgp&amp;diff=545&amp;oldid=prev</id>
		<title>imported&gt;Freenet: Created page with &quot;PGP stands for &#039;pretty good privacy,&#039; and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoe...&quot;</title>
		<link rel="alternate" type="text/html" href="https://commons.thefnf.net/index.php?title=Pgp&amp;diff=545&amp;oldid=prev"/>
		<updated>2010-12-21T00:20:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;PGP stands for &amp;#039;pretty good privacy,&amp;#039; and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoe...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;PGP stands for &amp;#039;pretty good privacy,&amp;#039; and is an NSA-grade encryption standard based on the RSA/DSA prime number factorization schemes. Luckily, using PGP requires no math whatsoever. What it does require, however, is your own keypair, an understanding of how public key encryption works, and the software to make it all run. Most PGP software will take care of key generation for you, so let me skip to instructions on usage.&lt;br /&gt;
&lt;br /&gt;
A keypair, as you might imagine, consists of two separate keys. The first is called the private key, and allows whoever possesses it to DECRYPT message. The second is called the public key, and allows whoever possesses it to ENCRYPT messages. So, a person generates their very own keypair, and distributes their public key in whatever way they find appropriate (usually by putting it onto a keyserver such as pgp.mit.edu). This way, anybody can encrypt a message so that only they are able to decrypt it.&lt;br /&gt;
&lt;br /&gt;
Now, Let&amp;#039;s say that cypherpunk A wants to send a message to cypherpunk B, but he doesn&amp;#039;t want it to get read by intelligence agent #1. If both A and B have encryption keys, they are in luck. All that A has to do is write her message (on a computer that hasn&amp;#039;t already been hacked by the intelligence agent) and tell her encryption software to encrypt it using B&amp;#039;s public key. This message can now be sent via the public network without fear of ISP/Telecom/Government scrutiny.&lt;br /&gt;
&lt;br /&gt;
Luckily PGP software can take care of this process as well, maintaining a list of recipients for whom public keys are known, and using them automatically when they are the recipient of a message.&lt;/div&gt;</summary>
		<author><name>imported&gt;Freenet</name></author>
	</entry>
</feed>