Encryption [GPG]
Symmetric Encryption User A sends a password to user B. The password is used to encrypt the messages. A secure way to share the password is required. Asymmetric Encryption Users A and B have a public key and a private key. The public keys are shared, and they are used to encrypt the messages. The users can use their private keys to decrypt the messages. GPG Create a Set of Keys gpg --full-gen-key Select ECC (sign and encrypt) - The most secure option Select default curve Encrypt a File gpg --encrypt -r email@example.org <file> # Encrypt with the recipient (-r) key. Decrypt a File gpg --decrypt --output <file-output> <file> # Use the private key to decrypt a file. Encrypt a Message echo "Very safe message" | --encrypt --armor -r email@example.org -armor Saves the encrypted info in plain text. (Great for blog posts or copying/pasting) Decrypt a Message GPG automatically figures out which private key to use. The encrypted file includes some metadata. ...