Slide 1

Slide 1 text

GNU Privacy Guard and you

Slide 2

Slide 2 text

ariejan https://ariejan.net

Slide 3

Slide 3 text

KABISA http://kabisa.nl

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

WHY is this YOUR problem?

Slide 6

Slide 6 text

“Just because you're paranoid doesn't mean they aren't after you” Joseph Heller, Catch-22

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

No content

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

TRUST

Slide 12

Slide 12 text

HOW DOES ENCRYPTION WORK

Slide 13

Slide 13 text

HISTORY

Slide 14

Slide 14 text

SYMMETRIC KEY ENCRYPTION

Slide 15

Slide 15 text

No content

Slide 16

Slide 16 text

Symmetric Key Encryption a b c d e f g h i j k l m n o p q r s t u v w x y z | | | | | | | | | | | | | | | | | | | | | | | | | | c d e f g h i j k l m n o p q r s t u v w x y z a b "a secret massage".encrypt # => "c ugetgv ocuucig"

Slide 17

Slide 17 text

Symmetric Key Decryption c d e f g h i j k l m n o p q r s t u v w x y z a b | | | | | | | | | | | | | | | | | | | | | | | | | | a b c d e f g h i j k l m n o p q r s t u v w x y z "c ugetgv ocuucig".decrypt # => "a secret massage"

Slide 18

Slide 18 text

??? a b c d e f g h i j k l m n o p q r s t u v w x y z | | | | | | | | | | | | | | | | | | | | | | | | | | n o p q r s t u v w x y z a b c d e f g h i j k l m

Slide 19

Slide 19 text

ROT13 a b c d e f g h i j k l m n o p q r s t u v w x y z | | | | | | | | | | | | | | | | | | | | | | | | | | n o p q r s t u v w x y z a b c d e f g h i j k l m "Hello World".rot13.rot13.rot13.rot13 #=> "Hello World"

Slide 20

Slide 20 text

PROBLEM?

Slide 21

Slide 21 text

PUBLIC KEY ENCRYPTION

Slide 22

Slide 22 text

Why does RSA work? e*d = 1 mod ϕ(n) Public Key: [e,n] Private Key: [d, n] def encrypt(message, e, n) (message ** e) % n end def decrypt(message, d, n) (message ** d) % n end

Slide 23

Slide 23 text

LARGE numbers

Slide 24

Slide 24 text

Encryption with GPG

Slide 25

Slide 25 text

Encryption has NOTHING to do with TRUST

Slide 26

Slide 26 text

Cryptographic signatures

Slide 27

Slide 27 text

Signatures have NOTHING to do with TRUST

Slide 28

Slide 28 text

There is no Central Authority

Slide 29

Slide 29 text

WEB of TRUST

Slide 30

Slide 30 text

NOW WHAT?!

Slide 31

Slide 31 text

Not just for comms

Slide 32

Slide 32 text

GPG And Your Business

Slide 33

Slide 33 text

So why are we not using GPG all the time?

Slide 34

Slide 34 text

GnuPG Field Guide 1.Don't panic! 2.Get GPGTools for Mac or brew install gpg2 3.Setup your own keys 4.Exchange and sign keys (with trust) 5.Spread the word!

Slide 35

Slide 35 text

Next up

Slide 36

Slide 36 text

THANKS! » https://ariejan.net » [email protected] » @ariejan GPG Public Key » http://aj.gs/pubkey 8450 D928 4373 164E 25CC 7E0D AD73 9154 F713 697B