Windows 7 Windows 8 Windows 10 Mac OS X Android iPhone Language: EN Version: 2.1.608. Gpg4Usb is software for encrypting messages. GnuPG distributions are signed. It is wise and more secure to check out for their integrity. Remarks: Pinentry is a collection of passphrase entry dialogs which is required for almost all usages of GnuPG.; GPGME is the standard library to access GnuPG functions from programming languages.; Scute is a PKCS#11 provider on top of GnuPG.; GPA is a graphical frontend to GnuPG. Gpg4usb is a PGP tool that can be ran off of a USB drive and works on both Windows and GNU/Linux, with OS X support planned. It features a very intuitive user interface, portability so it can be used on multiple devices, and is of course open source. It uses GnuPG as the backend, like most PGP methods. Gpg4usbis a simple, lightweight and portable program that lets you encrypt and decrypt text messages and files. Gpg4usbis based on public-key cryptography. In this method, each individual must generate her/his own personal key pair. The first key is known as the private key.

Gpg4usb Mac Os

What is Copyleft?

Copyleft is a general method for making a program (or other work) free(in the sense of freedom, not“zero price”), and requiring all modified and extended versions ofthe program to be free as well.

The simplest way to make a program free software is to put it in thepublicdomain, uncopyrighted. This allows people toshare the program and their improvements, if they are so minded. Butit also allows uncooperative people to convert the program intoproprietarysoftware. They can make changes, many or few,and distribute the result as a proprietary product. People whoreceive the program in that modified form do not have the freedom thatthe original author gave them; the middleman has stripped it away.

In the GNU project, our aim isto give all users the freedom to redistribute and change GNUsoftware. If middlemen could strip off the freedom, our code might “havemany users,” but it would not give them freedom. So instead ofputting GNU software in the public domain, we “copyleft”it. Copyleft says that anyone who redistributes the software, with orwithout changes, must pass along the freedom to further copy andchange it. Copyleft guarantees that every user has freedom.

Copyleft also provides anincentivefor other programmers to add to free software.Important free programs such as the GNU C++ compiler existonly because of this.

Copyleft also helps programmers who want to contributeimprovements tofree software get permission todo so. These programmers often work for companies or universitiesthat would do almost anything to get more money. A programmer maywant to contribute her changes to the community, but her employer maywant to turn the changes into a proprietary software product.

When we explain to the employer that it is illegal to distribute theimproved version except as free software, the employer usually decidesto release it as free software rather than throw it away.

To copyleft a program, we first state that it is copyrighted; then weadd distribution terms, which are a legal instrument that giveseveryone the rights to use, modify, and redistribute the program'scode, or any program derived from it, but only if thedistribution terms are unchanged. Thus, the code and the freedomsbecome legally inseparable.

Proprietary software developers use copyright to take away the users'freedom; we use copyright to guarantee their freedom. That's why wereverse the name, changing “copyright” into“copyleft.”

Copyleft is a way of using the copyright on the program. Itdoesn't mean abandoning the copyright; in fact, doing so would makecopyleft impossible. The “left” in“copyleft” is not a reference to the verb “toleave”—only to the direction which is the mirror image of“right”.

Copyleft is a general concept, and you can't use a general conceptdirectly; you can only use a specific implementation of the concept.In the GNU Project, the specific distribution terms that we use formost software are contained in the GNU General Public License. The GNU GeneralPublic License is often called the GNU GPL for short. There is also aFrequently Asked Questions pageabout the GNU GPL. You can also read aboutwhy the FSF gets copyrightassignments from contributors.

An alternate form of copyleft, the GNUAffero General Public License (AGPL) is designed forprograms that are likely to be used on servers. It ensures thatmodified versions used to implement services available to the publicare released as source code to the public.

A compromise form of copyleft, the GNULesser General Public License (LGPL) applies to a few (but notall) GNU libraries. To learn more about properly using the LGPL, pleaseread the article Why youshouldn't use the Lesser GPL for your next library.

The GNU Free Documentation License (FDL)is a form of copyleft intendedfor use on a manual, textbook or other document to assure everyone theeffective freedom to copy and redistribute it, with or withoutmodifications, either commercially or noncommercially.

The appropriate license is included in many manuals and in each GNUsource code distribution.

All these licenses are designed so that you can easily apply them toyour own works, assuming you are the copyright holder. You don't haveto modify the license to do this, just include a copy of the licensein the work, and add notices in the source files that refer properlyto the license.

Using the same distribution terms for many different programs makes iteasy to copy code between various different programs. When they allhave the same distribution terms, there is no problem. The LesserGPL, version 2, includes a provision that lets you alter thedistribution terms to the ordinary GPL, so that you can copy code intoanother program covered by the GPL. Version 3 of the Lesser GPL isbuilt as an exception added to GPL version 3, making the compatibilityautomatic.

If you would like to copyleft your program with the GNU GPL or the GNULGPL, please see the licenseinstructions page for advice. Please note that you must use the entiretext of the license you choose. Each is an integral whole, andpartial copies are not permitted.

If you would like to copyleft your manual with the GNU FDL, pleasesee the instructions at theend of the FDL text, andthe GFDL instructions page. Again,partial copies are not permitted.

It is a legal mistake to use a backwards C in a circle instead of acopyright symbol. Copyleft is based legally on copyright, so the workshould have a copyright notice. A copyright notice requires eitherthe copyright symbol (a C in a circle) or the word“Copyright”.

A backwards C in a circle has no special legal significance, so itdoesn't make a copyright notice. It may be amusing in book covers,posters, and such, but becareful how you represent it in a web page!

Updated21 July 2014

This guide is no longer being maintained

This content is currently unmaintained and may be significantly out of date. Please do not rely on it.

gpg4usb is a free, open source, portable program for encrypting text (email) messages and files. It uses the same Public Key Encryption algorithm as GPG and PGP programs.

  • The ability to encrypt files and text messages from wherever you are (for instance, an Internet café or at work).
  • The ability to encrypt the messages off-line or when Internet access is unavailable, and then send them from a computer connected to the Internet later.

1.1 Things You Should Know about gpg4usb Before You Start

gpg4usb is a simple, lightweight and portable program that lets you encrypt and decrypt text messages and files. gpg4usb is based on public-key cryptography. In this method, each individual must generate her/his own personal key pair. The first key is known as the private key. It is protected by a password or passphrase, guarded and never shared with anyone.

The second key is known as the public key. This key can be shared with any of your correspondents - and your correspondents can share theirs with you. Once you have a correspondent’s public key you can begin sending encrypted emails to this person. Only she will be able to decrypt and read your emails, because she is the only person who has access to the matching private key.

Similarly, if you send a copy of your own public key to your email contacts and keep the matching private key secret, only you will be able to read encrypted messages from those contacts.

You may also attach digital signatures to your messages. The recipient of your message who has a genuine copy of your public key will be able to verify that the email comes from you, and that its content was not tampered with on the way. Similarly, if you have a correspondent's public key, you can verify the digital signatures on her messages.

gpg4usb lets you generate an encryption key pair, export public keys to be shared with other people, compose a text message, and encrypt it. You can either simply copy and paste the public key and/or encrypted message from gpg4usb to the body of your email, or save them as a text file to be sent later. Documents and files can be encrypted too.

Note: Be mindful that the original, unencrypted versions of your documents and files may still reside on your computer, so both your correspondent and yourself must remember to remove them from computers when necessary.

gpg4usb lets you exchange keys and encrypted messages with other similar GPG or PGP programs.

For more information about public key encryption, see Chapter 2.4 Cryptology - Public Key Encryption on page 38 of Digital Security and Privacy for Human Rights Defenders.

2.0 Install gpg4usb

gpg4usb is a portable tool that does not require installation on your computer. The software is disturbed as a zip and should be extracted directly to a USB drive or to a folder on your computer; to begin perform the following steps:

Step 1. Locate the gpg4usb zipped archive file, and then extract all the files to a removable USB drive or a folder on your computer:

Figure 1: The gpg4usb program destination location

2.1 Generate a Key Pair

Before you can begin encrypting and decrypting email, text messages, documents and files, you must take two preparatory steps: first you need to generate or import your encryption key pair and second you need to send your public key to your contacts and receive their public keys and import them to your key ring. We describe how to share public keys on the next page. gpg4usb assist you with generating your key pair on the first start of the program. Note that you can always come back to Getting Started window from the Help -> Open Wizard menu.

Step 1. To run the gpg4usb program for the first time , find and double click to open the gpg4usb folder and then double click . This will activate the Getting Started window. Select a language and click Next.

Step 2. At the Choose your Action screen, click Create a new keypair.

Figure 2: Choose your Action

Note the other options to import existing keys available on the First Start Wizard screen. If upgrading from a previous version of gpg4usb, you can choose import settings and/or keys from gpg4usb. If using Thunderbird with Enigmail, you can choose the option import keys from GnuPG. You can also choose to import keys at a later stage by running the wizard again from the Help -> Open Wizard menu.

Step 3. At the Create a keypairclickCreate New Key.

Figure 3: Create New Key

Step 4. Enter the appropriate data into the corresponding text fields, so that your own window resembles the following:

Figure 4: An example of a completed Generate Key form

Important:

  • Set a secure password to protect your private key (please refer to How to create and maintain secure passwords).
  • We advice that you use expiration date and that you set it to less then 5 years.
  • We strongly recommend that you generate keys of at least 2048 bit size. Key of a larger size is more secure, but also requires more time to create, encrypt and decrypt texts.

Note: You do not need to use your real name and real email address when generating your key. However, using email address of the account you will use to communicate will make it easier for your contacts to associate your key with this account.

Step 6. ClickOK to generate the keypair.

Figure 5: Generating a key..

Figure 6: New key created

Step 7. ClickOK to come back to the gpg4usb window. After the keypair has been successfully generated, you will see a screen resembling the following:

Figure 7: The gpg4usb window, displaying the newly created key pair

Now that you have successfully created a key pair, you need to learn how to export your public key to share it with other people, and how to import the public keys of your correspondents.

3.1 Export Your Public Key

You must send your public key to your correspondent before they can send encrypted messages to you.

To export your public key with gpg4usb, perform the following steps:

Step 1. Double click to open the gpg4usb folder.

Step 2. Double click to open gpg4usb program.

Step3. Click to activate the following screen:

Figure 1: The Keymanagement window displaying all the key pairs

Step 3. Check your own key, as shown in Figure 1 above.

Step 4. Select the Export To File item from the Key menu as shown below:

Figure 2: The Keymanagement window with the Export To File item selected

This will activate the following screen:

Figure 3: The Export To Folder browse window

Step 5. Click to save your key pair to the gpg4usb program folder.

Step 6: Send the exported file with your public key as an attachment to your correspondent.

3.2 Import a Correspondent's Public Key

Before you can encrypt information and send it to your correspondent, you need to receive and import their public key. To import a correspondent's Public key using gpg4usb, perform the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Click Import to activate the following screen:

Figure 4: The Import Key dialog box

Step 3. Browse and select the key you wish to import.

Figure 5: Open Key

Step 4. Click Open to activate following window.

Gpg4usb Mac Os Mojave

Figure 6: Key Import Details

Step 5. Click OK to close above window and come back to gpg4usb main window. It will display newly imported public key as below.

Figure 7: The gpg4usb console displaying the newly imported public key associated with your correspondent's account

Now that you have successfully imported a correspondent's public key, you must now verify and sign that imported key.

3.3 Verify a Key Pair

You must verify that the imported key truly belongs to the person who purportedly sent it and then verify it as being authentic. This is an important step that both you and your email contacts should follow for each public key that you receive.

To verify a key pair, perform the following steps:

Step 1. Contact your correspondent through some means of communication other than email.

Note: You may use a telephone, text messages, Voice over Internet Protocol (VoIP) or any other method, but only if you are certain that you are really communicating with the right person. As a result, telephone conversations and face-to-face meetings provide the greatest assurance of the authenticity of a person's identity, if or when they can be arranged safely.

Step 2. You and your correspondent should verify that the 'fingerprints' of the public keys that you have exchanged are the same.

Note: A fingerprint is a unique series of numbers and letters that identifies each key. The fingerprint itself is not a secret, and can be recorded and used for verification later if or when required.

To view the fingerprint of key pairs you have created or public keys you have imported, perform the following steps:

Step 1. Select a key, then right-click it to activate its associated pop-up menu.

Step 2. Select the Show Keydetails item as shown below in Figure 8.

Figure 8: The pop-up menu associated with a correspondent's key

This will activate the following screen:

Figure 9: The Keydetails window with the key fingerprint on the bottom

Step 3. Compare this fingerprint with the one your correspondent see in her gpg4usb program.

Your correspondent should repeat these steps. Confirm with each other that the fingerprint for the key each of you have exchanged matches the sender's original. If they don't match, exchange your public keys again (perhaps over different email address or communication method) and repeat the verification process.

If the fingerprints match each other exactly, then you are ready to securely send encrypted messages and files between each others.

4.0 Encrypt Text

In the example that follows, Terence will encrypt an email for his friend Salima, using the following steps:

Step 1. Double click to open the gpg4usb console.

Step 2. Compose your message as shown in the example below:

Figure 1: The gpg4usb console displaying an example of a message

Step 3. Check the check box associated with the intended recipient of your email as follows:

Figure 2: The gpg4usb console displaying the intended recipient

Note: You can encrypt a message to more than one recipient by simply checking their corresponding check boxes in the Encrypt for: pane. Also, it may prove useful for your personal records to encrypt that message to yourself, so you can read what you sent later.

Step 4. Either click or select Encrypt from the Crypt menu to encrypt your message as follows:

Figure 3: The gpg4usb console displaying an example of an encrypted message

Step 5. Click to select the entire encrypted message, and then click to copy the message to the clipboard.

Note: Alternatively, you may use the short-cut keys associated with each item in the menu, in this case Ctrl + E will encrypt the message, Ctrl + A will select the entire encrypted message, and Ctrl + C will copy the message to the clipboard.

Step 6. Open your email account and then open a blank message page, and then paste this message so that it resembles the following:

Figure 4: An example of a message encrypted in gpg4usb pasted into a Gmail account email

Note: Rich Text Formats (RTF) can corrupt the encrypted message format; hence, it is better to compose your messages in plain text. To convert RTF into plain text in Gmail simply clickMore Options and selectPlain Text Mode displayed at the foot of the message pane as shown below:

Figure 5: Gmail Format Options

4.1 Decrypt Text

To decrypt an encrypted email, perform the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Open your email account, and then open the message.

Step 3. Select, copy and then paste the encrypted message into the gpg4usb console untitled1.txt tab as follows:

Gpg4usb Mac Os

Figure 6: The gpg4usb console displaying a message for decryption

Note: If the encrypted text appears with double line breaks as shown in Figure 7 below, gpg4usb might not be able to automatically decrypt it. To remove these double line breaks, click on (or selectRemove double Linebreaks from the Edit menu) to remove them and then continue the decryption process at Step 4.

Figure 7: The gpg4usb console displaying a message for decryption with double linebreaks

Step 4. Click and enter the password you assigned when generating a key pair, as shown in the following screen:

Figure 8: The Enter Password prompt window

Step 5. ClickOK to activate a gpg4usb console resembling Figure 2 above.

4.2 Encrypt Files

The process for encrypting a file is similar to encrypting text messages; in the example that follows, Salima will encrypt a file for Terence, using the following steps:

Step 1. Double click to open the gpg4usb program.

Download viber for mac os el capitan free. Viber for Mac OS is one of the most popular versions of the world-famous messenger that was developed to meet all the needs of Mac OS –based devices. The program has been popular since 2010 and currently offers numerous versions for mobiles, tablets, PCs. MacOS X El Capitan is the successor of OS X Yosemite providing numerous powerful features enhancements and better performance than the previous releases. It basically focusses on the stability, security and the performance. It is the polished version of OS X Yosemite. Apple makes various changes to improve the performance and stability of the OS including LibreSSL replacing OpenSSL, graphics. Viber for Desktop is synced to your mobile account. To activate Viber for Desktop, you will need an active Viber account on your mobile phone. Download for Windows Download for Mac macOS 10.13 and up. Here’s how to download Mac OS X El Capitan DMG file also. MacOS X El Capitan is a stable version of OS X and it is quite different and known as the advanced version of Mac. This operating system contains countless supplements and a variety of work capacities. In this launch, Apple primarily concentrated on compatibility, security, and stability.

Step 2. Click and Encrypt File to activate the following screen:

Figure 9: The Encrypt File window

The Encrypt File window scroll list (outlined in black) lets you select the email account and corresponding key you will use to encrypt a message to.

Gpg4usb On Mac

Step 3. Click beside Input item to activate the following screen:

Figure 10: The Open File browser window

Step 4. Click to attach the file to be encrypted and return to the Encrypt window as follows:

Gpg4usb Mac Os High Sierra

Figure 11: The Encrypt File window displaying the file designated for encryption

Step 5. ClickOK to activate the following screen:

Figure 12: The Done confirmation dialog box

The Done confirmation dialog box shows you where the newly encrypted file resides. An encrypted file can also be identified by either a .asc file extension, for example, Meeting Minutes.doc.asc.

Step 6. ClickOK to complete the file encryption process.

Note: You can encrypt a text message you might send along with the encrypted file separately.

Step 7. Using your email account, navigate to the location specified in the Done confirmation dialog box (Figure 12), and then attach the encrypted file to you email as you would any other file.

IMPORTANT: Observe that the name of the file is not encrypted. Make sure that this name does not reveal any important information! Do not forget that an unencrypted version of the file continues to reside on the disk.

4.3 Decrypt Files

In the example that follows, Terence will decrypt the file Salima has sent to him, using the following steps:

Step 1. Double click to open the gpg4usb program.

Step 2. Open your email account, open the message and download the attached file.

Note: If your correspondent has sent a message accompanying the encrypted file, you may decrypt that message by using the method outlined in the Decrypt Textsection

Step 3. In the gpg4usb console (as shown in Figure 1 above), click and Decrypt File window (as in Figure 13 below).

Step 4. Click beside Input item to browse to the location of the downloaded encrypted file as follows:

Figure 13: The Decrypt window, displaying the path to the encrypted file

Gpg4usb Mac Os Versions

Step 5. ClickOK to activate the following screen:

Figure 14: The Done confirmation dialog box displaying the location of the decrypted file

Important: If you are working from an internet café or at workstations other people may have access to decrypted version of the file, it is better to copy the .asc file to your USB or portable drive, and take it with you so you may decrypt it in the privacy of your own home.

Q: Does gpg4usb have to be used from USB memory stick?

A: No. It can be extracted to and run from your computer hard disk.

Q: How many accounts may I generate key pairs for?

A: As many as you need.

Q: I like the fact that simple cut-and-paste operations are used here.

A: Indeed. However, don't forget that your email subject header remain unencrypted. Therefore, be careful and don't enter a subject title which is descriptive or may give you away potentially!

Coments are closed
Scroll to top