PGP Guide for Mac OSX
Part 0 – Introduction
Here’s my basic guide for PGP on OS X. The OS in question is OS X 10.9 Mavericks, but it should still work for other versions. As for the tool itself, we’ll be using GPG Suite Beta 5. This is my first time using OS X in… years. If you see anything I’m doing wrong, or could be done easier, feel free to correct me in the comments.
If you’ve done your research, you’ll see it’s not recommended to do anything darknet related on OS X, but I’m not going to go over the details here. You’ve obviously made your decision.
Part 1 – Installing the software
Like I said above, we’ll be using GPG Suite Beta 5. If you’re curious and want to see the source code, you can do so here.
- Head on over to https://gpgtools.org, and download ‘GPG Suite Beta 5′
- Open the file you downloaded, you should see this screen. Double click on ‘Install’
- Follow the installation process. If successful, you should see this screen. You can now close the window
Part 2 – Creating your keypair
GPG Suite actually makes this a super simple process. Just like the Linux guide, we’ll be using 4096 bit length for encryption.
- Open up GPG Keychain, you should be greeted by this beautiful window
- Click ‘New’ at the top left of the window
- You should see a small popup. Click the arrow beside ‘Advanced options’, make sure the key length is 4096. For our purposes, we’ll uncheck ‘key expires’. Put your username where it says ‘full name’, fill out what you want for email, and create a secure passphrase. Check the picture for an example on how to fill it out. When complete, click ‘Generate key’
- GPG Keychain will begin generating your key. Move the mouse around, mash keys in a text editor, have something downloading. Do random stuff to create entropy for a secure key.
- annndddddd we’re done!
Part 3 – Setting up the environment
This is where OS X differs from other platforms. The suite itself doesn’t provide a window to encrypt/decrypt messages, so we need to enable some options.
- Go into system preferences, open up ‘Keyboard’
- You should see this window. Click the ‘Keyboard Shortcuts’ tab at the top, then ‘Services’ in the left pane. Scroll down in the right pane to the subsection labeled ‘Text’, and to the OpenPGP options. Here you can create keyboard shortcuts. We’ll uncheck everything OpenPGP that’s under ‘Text’, and delete their shortcuts. Now we’ll enable ‘Decrypt’, ‘Encrypt’, and ‘Import key’. Create keyboard shortcuts for these if you wish. Check the picture to make sure you’re doing everything correctly. You can now close the window.
Part 4 – Obtaining your public key
This part is super simple.
- Open up GPG Keychain, select your key
- At the top of the window, click ‘Export’
- Give it a name, make sure ‘include secret key in exported file’ is unchecked, and click ‘save’
- Open your text editor of choice, browse to where you saved the key, open it
- There it is. Copy and paste this on your market profile to make it easier for people to contact you
Part 5 – Obtaining your private key
Again, super simple.
- Open up GPG Keychain, select your key
- At the top of the window, click ‘Export’
- Keep the file name it gives you, check ‘Include secret key in exported file’, then click save
Keep this file in a safe place, and don’t forget your passphrase. You’re fucked without it!
Part 6 – Importing a public key
This is really easy.
- Find the key you want to import.
- Copy everything from ‘—–BEGIN PGP PUBLIC KEY BLOCK—–‘ to ‘—–END PGP PUBLIC KEY BLOCK—–‘
- Paste it into your favourite text editor, highlight everything, right click, go to ‘Services’, then ‘OpenPGP: Import key’
- You’ll see this window pop up confirming the key has been imported, click ‘Ok’
- Open up GPG Keychain just to confirm the key is there
Part 7 – Importing a private key
Again, really easy.
- Open GPG Keychain, click ‘Import’ at the top
- Browse to where your key is, click it, then click ‘Open’. It should have a .asc file extension
- You’ll see this pop up confirming your key has been imported. Click ‘Close’
Part 8 – Encrypting a message
- Open your text editor of choice, write your message
- Highlight the message, right click, ‘Services’, ‘OpenPGP: Encrypt’
- A window should appear. Select who you’re sending it to, sign it with your key if you wish, click ‘Ok’
- Copy everything, and send it to the recipient
Part 9 – Decrypting a message
Pretty much the same process as encrypting
- Open your text editor of choice, paste the message
- Highlight everything, right click, ‘Services’, ‘OpenPGP: Decrypt’
- A window should pop up. Enter your passphrase, then click ‘Ok’
- aannnddddd there’s your message
Part 10 – Conclusion
That wasn’t too hard, was it? Like I said in the intro, you shouldn’t be using OS X for DNM activities due to privacy issues, but I won’t go into it. This took forever to complete because OS X is a bitch to get running properly in a virtual machine. A guide for Windows will be coming next week!
Источник
Kleopatra pgp mac os
You can download the full version (including the Gpg4win compendium) of Gpg4win 3.1.16 here:
OpenPGP signature (for gpg4win-3.1.16.exe)
SHA256: c499213ff3e14e93c3b245546994cc0e654ec267b40a188788665ae8f4e9f5ad
Changelog
More Gpg4win-3.1.16 downloads
- Gpg4win source code package:
gpg4win-3.1.16.tar.bz2 (Size: 273 MByte)
OpenPGP signature
SHA256 checksum: d74fd2ff4c5ee241c6a55cc60a10899ea29d8ca4c5a316fc98fec41ad49d19e1 - All versions and OpenPGP signatures:
files.gpg4win.org. - To create a portable Gpg4win version use the included tool mkportable.exe .
HOWTO: Install Gpg4win with all components and then run from the command line (cmd) in install directory: mkportable.exe [OPTIONS] TARGETDIR . Use mkportable.exe —help to get all options. The portable version does not include GpgOL and GpgEX! Your certificates and settings are saved in the directory ‘home’ of portable version.
Please note: Do not use portable applications — especially crypto applications — on potentially infected systems.
For the full mkportable version of Gpg4win you have to install all components including GPA. Additionally the name of the target folder has to be at least four characters long.
Installation
After downloading please verify the integrity of your Gpg4win package. Then double-click on the file you have downloaded and follow the instructions on the screen (or look at the documentation) and read the current README file.
Gpg4win Compendium 3.0.0 (Released: 2016-11-30)
You find the current PDF and HTML version of the Gpg4win Compendium here:
Read the documentation page for more information about available Gpg4win documentation.
All Downloads
Current and all previous Gpg4win installers as well as signatures and corresponding source code packages are available under: files.gpg4win.org
In the change history you will find information about the most relevant changes and which version of the products each of the releases contained. Also, you will find direct download link for the old releases.
All Beta releases (with OpenPGP-Signatures): files.gpg4win.org/Beta/
Please note that old releases may still contain meanwhile fixed security issues.
The public Gpg4win git repository contains the current Gpg4win source code.
Hints
We recommend to subscribe to the Gpg4win announcement mailing list to be automatically informed about new releases and other important Gpg4win news.
For public administrations: An an approval to handle governmental documents that are classified ‘restricted’ (‘VS-NUR FГњR DEN DIENSTGEBRAUCH’) is aimed for by the German Federal Office for Information Security (BSI).
Источник
Kleopatra pgp mac os
Download
Note that you may also download the GNU Privacy Guard from a mirror site close to you. See our list of mirrors. The table below provides links to the location of the files on the primary server only.
Source code releases
These are the canonical release forms of GnuPG. To use them you need to build the binary version from the provided source code. For Unix systems this is the standard way of installing software. For GNU/Linux distributions are commonly used (e.g. Debian, Fedora, RedHat, or Ubuntu) which may already come with a directly installable packages. However, these version may be older so that building from the source is often also a good choice. Some knowledge on how to compile and install software is required.
The table lists the different GnuPG packages, followed by required libraries, required tools, optional software, and legacy versions of GnuPG. For end-of-life dates see further down.
Name | Version | Date | Size | Tarball | Signature |
---|---|---|---|---|---|
GnuPG | 2.3.2 | 2021-08-24 | 7411k | download | download |
GnuPG (LTS) | 2.2.32 | 2021-10-06 | 7043k | download | download |
Libgpg-error | 1.42 | 2021-03-22 | 951k | download | download |
Libgcrypt | 1.9.4 | 2021-08-22 | 3163k | download | download |
Libgcrypt (LTS) | 1.8.8 | 2021-06-02 | 2917k | download | download |
Libksba | 1.6.0 | 2021-06-10 | 646k | download | download |
Libassuan | 2.5.5 | 2021-03-22 | 558k | download | download |
ntbTLS | 0.2.0 | 2020-08-27 | 340k | download | download |
nPth | 1.6 | 2018-07-16 | 293k | download | download |
Pinentry | 1.2.0 | 2021-08-25 | 486k | download | download |
GPGME | 1.16.0 | 2021-06-24 | 1678k | download | download |
Scute | 1.7.0 | 2021-01-07 | 831k | download | download |
GPA | 0.10.0 | 2018-10-16 | 745k | download | download |
GnuPG 1.4 | 1.4.23 | 2018-06-11 | 3661k | download | download |
GnuPG distributions are signed. It is wise and more secure to check out for their integrity.
- Pinentry is a collection of passphrase entry dialogs which is required for almost all usages of GnuPG.
- GPGME is the standard library to access GnuPG functions from programming languages.
- Scute is a PKCS#11 provider on top of GnuPG.
- GPA is a graphical frontend to GnuPG.
- GnuPG 1.4 is the old, single binary version which still support the unsafe PGP-2 keys. This branch has no dependencies on the above listed libraries or the Pinentry. However, it lacks many modern features and will receive only important updates.
GnuPG binary releases
In general we do not distribute binary releases but leave that to the common Linux distributions. However, for some operating systems we list pointers to readily installable releases. We cannot guarantee that the versions offered there are current. Note also that some of them apply security patches on top of the standard versions but keep the original version number.
OS | Where | Description |
---|---|---|
Windows | Gpg4win | Full featured Windows version of GnuPG |
download sig | Simple installer for the current GnuPG | |
download sig | Simple installer for GnuPG 1.4 | |
OS X | Mac GPG | Installer from the gpgtools project |
GnuPG for OS X | Installer for GnuPG | |
Debian | Debian site | GnuPG is part of Debian |
RPM | rpmfind | RPM packages for different OS |
Android | Guardian project | Provides a GnuPG framework |
VMS | antinode.info | A port of GnuPG 1.4 to OpenVMS |
RISC OS | home page | A port of GnuPG to RISC OS |
End-of-life announcements
We announce the end-of-life date for a current stable version at the time a new stable version is released. We maintain old branches for at least two years. For GnuPG 2.2 we consider 2.1.0 as the birth of this new stable branch. For most other packages we don’t maintain branches and thus there is no end-of-life; always use the latest version.
Источник