Introduction to PGP (Part 2)

preview_player
Показать описание
You're watching Infosec Bytes, a crash course in information security for journalists. We're based at the Centre for Investigative Journalism in London and supported by the Logan Foundation.

This video is Part 2 of our Introduction to PGP.

---

Animations by Jose Passarelli

---

Infosec Bytes would not have been possible without invaluable criticism and feedback from reviewers:

Marie Gutbub
Information Security Trainer/Journalist

Jens Kubieziel
Security Researcher

Fabio Natali
Software Developer/Information Security Trainer

Christian Vandrei
Privacy Activist

Dr. Richard Tynan
Technologist

Daniel Anti-Freeze
Information Security Trainer

---

Licensing and Attribution



Рекомендации по теме
Комментарии
Автор

Please don’t ever remove your channel and videos. They are an incredible help to those who are new to all this. It’s very difficult explaining these topics to a friend or family member without seeing their eyes gloss over in confusion so your videos are a tremendous help. 🙏

razerone
Автор

I think that it is worth mentioning that when John uses Sam's public key, to encrypt a message for Sam, that Sam, and only Sam, can decrypt and read John's message.
So when I say Sam, and only Sam, that means that even John cannot decrypt the message that he sent to Sam.

Of course, John could easily keep a non encrypted copy of his message. But the copy that he sends to Sam, which is encrypted, cannot be decrypted by John.

Some folks will encrypt messages to not only Sam, but to themselves, too.
Meaning, John can use two public keys (Sam's and his own) and create an encrypted message. Since John encrypted the message using both Sam's public key and his own public key, that means that both Sam and John can decrypt the message.

My point is that being the creator of the encrypted message gives you no more access to decrypt the message than any adversary that intercepts the encrypted message.
Only if your own public key was used as part of the encryption will you be able to decrypt the message.

Great video, by the way. :-)

Cheers!

NoEggu
Автор

Think Pad is produced in China with hardware backwoods soldered in?

gabehcuodsuoitneterp
Автор

Doubt I will get a response here but... It's pretty easy to fake myself being anyone and publishing my key and saying I'm "Tiger Woods". Then people will download my public key from a keyserver thinking they're writing Tiger Woods, but really I'm not tiger woods and i'm getting the messages... how do we prevent that?

sofloemir