Regular Email and Privacy
When you send an email, its contents are open for anybody to read. Email is like sending a postcard: anyone who can access it can read it.
To keep data sent via email private, you need to encrypt it. Only the intended recipient will be able to decrypt the message while anybody else sees only gibberish.
Public key encryption is a special case of encryption. It operates using a combination of two keys:
- a private key and
- a public key,
which together form a pair of keys.
The private key is kept secret on your computer since it is used for decryption. The public key, which is used for encryption, is given to anybody who wants to send encrypted mail to you.
For the most secure setup it's best to move (not copy) your private key to a USB flash drive for safe keeping.
Sending Public-Key Encrypted Mail
The sender's encryption program uses your public key in combination with the sender's private key to encrypt the message.
Receiving Public-Key Encrypted Mail
When you receive the encrypted message, you need to decrypt it. Decryption of a message encrypted with a public key can only be done with the matching private key. This is why the two keys form a pair, and it is also why it is so important to keep the private key safe and to make sure it never gets into the wrong hands (or in any hands other than yours).
Why the Integrity of the Public Key is Essential
Another crucial point with public key encryption is the distribution of the public key.
Public key encryption is only safe and secure if the sender of an encrypted message can be sure that the public key used for encryption belongs to the recipient. A third party could produce a public key with the recipient's name and give it to the sender, who uses the key to send important information in encrypted form. The encrypted message is intercepted by the third party, and since it was produced using their public key they have no problem decrypting it with their private key.
This is why it is mandatory that a public key is either given to you personally
or authorized by a certificate authority. (The CA model is so hopelessly broken it can be considered useless for this purpose.)
The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0:
"As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys."
For more information on Web of Trust issues and how to build such a Web of Trust, see http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
Signing the Keys of Trusted Contacts
When you exchange public keys with people you trust, that is, you are completely certain of who you're dealing with, you use your own key to "sign" the key of the other person. This helps to build the Web of Trust, and eliminates issues with man in the middle or third party interception type scenarios.
PGP was the original encryption package. PGP stands for Pretty Good Privacy. PGP is now a private, for-profit company, a division of Symantec and is a subscription based product. The Open Source equivalent in use now is GPG (GnuPrivacyGuard), and software is available for most operating systems. Both are based on the OpenPGP standard and are pretty much cross-compatible.
GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.
Enigmail is a security extension to Mozilla Thunderbird and Seamonkey. It enables you to write and receive email messages signed and/or encrypted with the OpenPGP standard. Sending and receiving encrypted and digitally signed email is simple using Enigmail. When starting it for the first time, you are guided through the basic setup. We also prepared a new users' guide that explains how to use OpenPGP. Enigmail is available for any system running Mozilla products.
Claws Mail is a user-friendly, lightweight, and fast email client for Windows and most flavors of *nix. It comes with the GPGME plugin and is ready-to-go solution for Windows/Linux. The appearance and interface are designed to be familiar to new users coming from other popular email clients, as well as experienced users. Almost all commands are accessible with the keyboard. The messages are managed in the standard MH format, which features fast access and data security. You'll be able to import your emails from almost any other email client, and export them just as easily. Lots of extra functionality, like an RSS aggregator, calendar, or laptop LED handling, are provided by extra plugins.
Gpg4win runs on Windows XP, Vista and 7. Both 32 and 64bit systems are supported. The Outlook plugin GpgOL is compatible with Microsoft Outlook 2003 and 2007. Outlook 2010 is not supported.
A GnuPG Frontend GUI made in C#. It is compatible with PGP as well so it can be a very useful tool for encryption/decryption. It also incorporates a shell extension so it can be easy to right click and encrypt or decrypt.
Portable PGP is a fully featured, lightweight, java based, open source PGP tool. It allows to encrypt,decrypt,sign and verify text and files with a nice and absolutely straight graphical interface. It's absolutely simple to use and provides everything you need to get started with PGP cryptography.
Works with Oracle Java 7, Windows 7 x64 and Ubuntu (x64) OpenJDK. USB stick version available now.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before. For OSX 10.6+.
By downloading GPG Tools and Enigmail plugin, Mac users are good to go with either Apple Mail or Mozilla mail (Thunderbird, Seamonkey).
Encrypt an email account you already have: Thunderbird with Enigmail; Mac Mail with GPGTools; Outlook with GPG4Win.
For Windows or Linux: use Thunderbird with Enigmail plugin, or use Claws Mail with built in GPGME.
For Mac: install GPG Tools, then use Apple Mail, or Thunderbird with Enigmail plugin.
For more information on these topics and a walk-through of intalling Thunderbird/Enigmail/GPG please visit EnigMail Quick Start Guide.
How to set up your GPG key to be as secure as possible.
Use what the NSA uses! Here are informations from an article at The Register:
iPGMail is an iPhone/iPad app for sending and decrypting PGP encoded messages.
oPenGP is a solution to support OpenPGP standard (RFC 4880) on your iOS device. Fully compliant with GPG & PGP® Desktop software.
From the website: "There's no public key encryption for Android yet, but that's an important feature for many of us. APG tries to fill that void, with new features quickly being added. Hopefully APG will grow into a fully functional OpenGPG implementation of GPG or PGP calibre." APG works with K-9 Mail.
ProtonMail is an end-to-end encrypted secure email service for the masses. Proton takes their security very seriously: all email is encrypted from start to finish, from their servers to the recipient's. They have zero access to user data, use proven, open source cryptography, all servers are Swiss and therefore protected by the Swiss Data Protection Act and outside of the US and EU's jurisdiction. They own all of their servers which are located under 1000 meters of granite rock in a heavily guarded bunker which can survive a nuclear attack. ProtonMail keeps no logs of IP addresses or personally identifiable information. They also support setting expiration dates on encrypted emails, so they will be deleted from the recipients mailbox once they have expired. This is the real deal. For more in-depth information on ProtonMail's security and features, visit their website https://protonmail.com/security-details.
Countermail is a Sweden based webmail provider with integrated GPG support. Mail is encrypted on your own machine before sending, and vice versa. Accepts Bitcoin. Extremely secure, protects against man-in-the-middle (MITM) attacks, USB key option.
ShazzleMail is a free smartphone (iOS and Android) application that allows you to send private email to anyone in your contacts list. You can also use ShazzleMail on your laptop or desktop with an email client that supports POP/SMTP interface, including Microsoft Outlook. ShazzleMail sends all communications over a secure line, and keeps your email on your local storage device and not in some third party cloud. Based in Braintree, MA.
Secure web chatting. You must update Cryptocat to at least 2.1.12 to be safe from known problems. See this analysis of past issues.
Jabber client with integrated PGP encryption for Windows, Mac, and iOS. A free version is available to download.
Using GPG/PGP with Gmail and other webmail providers
Any plugin based webmail solution where you type your message and then click a button to encrypt before sending is useless from a security standpoint because the provider can see your message as you type it before it is encrypted, thus is completely insecure. Mailvelope solves this by opening an external editor where you compose your message before encrypting and then inserting the encrypted message into the webmail compose window. It also features key generation and management functions.
Mailvelope is currently in Beta status and does not support encrypted attachments. It is mandatory that you read and understand the instructions for proper use of the plugin if you wish to actually be secure.
Foreign intelligence organizations use the Internet for covert and clandestine communication without detection and you can as well. Do not believe that the NSA or DOJ is all powerful. They are not and they can be defeated.