Guess I'm back at square one -.-
So, after lots of testing...

seahorse: is useless, for some reason the window that I get is totally different from the ones that I saw at the tutorials online, so most actions are not there. For some reason I can barely do anything at all with this one.

gpa: installed it and honestly I pretty much like it, but I always get an error "general assuan error" that prevents me from doing basically anything with it.

pyrite: a little software that I found in this site https://github.com/ryran/pyrite looks good, and apparently does what I want but given the fact that is not a part of the repositories, I would rather not use it, even because it (from times to times) gives unexpected errors and bugs. Which is normal it was a one man project... Still, I don't think I feel very confortable with this one.

kgpg: basically too many broken dependencies for some reason. Gave it up.


I am thinking about using command line and maybe create a few scripts for nautilus. But I have some questions, hope someone will be able to clarify it for me:

1. Since I want to use GPG to encrypt text emails that I will be sending from an anonymous email, I feel uncertain about using the real email on "key generating" process. I think that if I by mistake upload the key to a server, it will reveal that my IP was the person behind the email all the time.

2. Could problem 1 be solved by not putting the email on "key generating" process? Would that still allow me to sign the messages, as in "be able to prove that it was I who sent the message"?

3. If I have imported 3 different keys from different persons/emails, how to I tell the system (in command line) that it must "use key1 for email1 and keyX for emailX"? Also, I will need to "save and store" the emails and keys of people who I want to connect to... That means that if an attacker can look at what keys are in my computer, it will be possible to "find out" who I am by seeing who I have been communicating with... right??


Sorry to make such a long post with so many questions, but PGP was always a part of computers that "puzzled me" a little. I a trying to overcome my initial fears and use it for better security :)
THANKS

Reply via email to