All the posts of this series is available here - PGP Series I have already explained the working of PGP, using PGP to encrypt your Passwords is probably the best method to encrypt it because it will be impossible to break it… if you don’t mess it up! Password management should be simple and follow Unix philosophy. With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password.
All the posts of this series is available here - PGP Series If you haven’t yet understood the working of PGP then read my previous article. For the sake of this article I will be using an online Encryption/Decryption program. You can download applications for your System from this link. No! Don’t do this mistake, I generated these keys just for the sake of this article.
All the posts of this series is available here - PGP Series If you’re like me, concerned about your privacy.. then this is for you. I am going to write a series of articles on this topic, we will start by learning about the working of PGP then move on to encrypting messages to encrypting files and then using it in your daily life.