

Since you don’t want your public key to expire, press to accept the default here (0 = key does not expire). You’ll now be asked to choose an expiration date.The default option, 1024, is a good tradeoff between CPU demand and security, so just press.



A good passphrase consists of several strings separated by spaces.
#My privacy guard password#
In brief, a passphrase is a multiword password of unlimited length. GnuPG’s technology won’t give you much protection if you choose an easily guessed passphrase. Generating a key pair is a simple process, as you’ll see, but you should give some thought to your passphrase before starting. Your correspondents use your public key to encrypt messages to you, and you use your private key to decode these messages. Your first task with GnuPG involves creating your key pair, including the private key that you never divulge to anyone and the public key that you make available to others. If you’re new to the basic concepts of encryption technology, be sure to read “GNU Privacy Guard brings industrial-strength encryption to Linux systems.” In particular, note that use of GNU Privacy Guard isn’t legal in some countries for more information, see “UsingGnuPG Legally.” Specifically, here’s what I’ll cover in this Daily Drill Down:
#My privacy guard full#
By the time you’ve finished working through this step-by-step approach to GnuPG, you’ll be ready to take full advantage of all the benefits strong encryption technology can give you, including secure, confidential storage and transmission of sensitive documents, as well as digital signatures that can reveal whether anyone has altered an important file.
#My privacy guard how to#
In this Daily Drill Down, you’ll learn how to get started with GNU Privacy Guard (abbreviated GnuPG) by using the program’s text-mode interface. GNU Privacy Guard implements public-key encryption based on the OpenPGP protocol. In this introduction to using GNU Privacy Guard, Bryan Pfaffenberger describes all the benefits strong encryption technology can give you, including secure, confidential storage and transmission of sensitive documents.
