Guess I'm back at square one -.-
So, after lots of testing...
seahorse: is useless, for some reason the window that I get is totally
different from the ones that I saw at the tutorials online, so most actions
are not there. For some reason I can barely do anything at all with this one.
gpa: installed it and honestly I pretty much like it, but I always get an
error "general assuan error" that prevents me from doing basically anything
with it.
pyrite: a little software that I found in this site
https://github.com/ryran/pyrite
looks good, and apparently does what I want but given the fact that is not a
part of the repositories, I would rather not use it, even because it (from
times to times) gives unexpected errors and bugs. Which is normal it was a
one man project... Still, I don't think I feel very confortable with this
one.
kgpg: basically too many broken dependencies for some reason. Gave it up.
I am thinking about using command line and maybe create a few scripts for
nautilus. But I have some questions, hope someone will be able to clarify it
for me:
1. Since I want to use GPG to encrypt text emails that I will be sending from
an anonymous email, I feel uncertain about using the real email on "key
generating" process. I think that if I by mistake upload the key to a server,
it will reveal that my IP was the person behind the email all the time.
2. Could problem 1 be solved by not putting the email on "key generating"
process? Would that still allow me to sign the messages, as in "be able to
prove that it was I who sent the message"?
3. If I have imported 3 different keys from different persons/emails, how to
I tell the system (in command line) that it must "use key1 for email1 and
keyX for emailX"? Also, I will need to "save and store" the emails and keys
of people who I want to connect to... That means that if an attacker can look
at what keys are in my computer, it will be possible to "find out" who I am
by seeing who I have been communicating with... right??
Sorry to make such a long post with so many questions, but PGP was always a
part of computers that "puzzled me" a little. I a trying to overcome my
initial fears and use it for better security :)
THANKS