diff options
Diffstat (limited to 'src/content/docs')
-rw-r--r-- | src/content/docs/guides/fundamental-concepts.md | 113 |
1 files changed, 77 insertions, 36 deletions
diff --git a/src/content/docs/guides/fundamental-concepts.md b/src/content/docs/guides/fundamental-concepts.md index 8c58a24..2312f03 100644 --- a/src/content/docs/guides/fundamental-concepts.md +++ b/src/content/docs/guides/fundamental-concepts.md @@ -12,26 +12,49 @@ communication, file protection, and digital signing. Let’s walk through the core concepts in a beginner-friendly way. -## 🔐 What Is a Key Pair? +## PGP and GPG: What’s the Difference Today? -At the heart of GPG is the **key pair**: two mathematically linked keys. +When people talk about “PGP,” they usually mean the OpenPGP standard for +encrypted communication—not the original commercial PGP software. GPG (GNU +Privacy Guard) is the free, open-source tool most people use today. It fully +supports the OpenPGP standard and is available for all major platforms. -- **Public Key**: Share this with anyone. Others use it to: - - Send you encrypted messages. - - Verify your digital signature. -- **Private Key**: Keep this secret. You use it to: - - Decrypt messages sent to you. - - Sign data so others know it’s really from you. +In short: -:::tip[Think of it like a mailbox] +- PGP was the original software, now rarely used. +- GPG is the open-source standard tool for modern encrypted email, files, and + signatures. -- Your public key is the address — people can send you letters. -- Your private key is the key to open the mailbox — only you can read what’s - inside. +If you’re just starting out, you almost always want to use GPG or a tool built +on top of GPG.able, but if you prefer open-source freedom and regular updates, +GPG is the usual choice. + +## What Is a Key Pair? + +In GPG, a **key pair** consists of a public key and a private key that are +mathematically linked. + +**Public Key**: Think of it as a locked mailbox. Anyone can drop a letter (your +encrypted message) into the mailbox and lock it. + +- Others use it to encrypt messages they send to you. +- Others use it to verify your digital signature. + +**Private Key**: This is the only key that opens the locked mailbox. You—and +only you—can retrieve and read the letters inside. + +- Decrypt messages sent to you. +- Sign your own messages or files so others know they truly came from you. + +:::tip[Everyday Analogy] + +Imagine you’ve installed a mailbox on the street. Anyone can deposit letters +into it (encrypt information), but only you—holding the mailbox key—can open it +and read what’s inside. ::: -## 🔧 Generating a Key Pair +## Generating a Key Pair To use GPG, you first create a key pair. During creation, you’ll choose: @@ -44,7 +67,7 @@ To use GPG, you first create a key pair. During creation, you’ll choose: file, they can’t use it without this password. ::: -## 🧩 What Are Subkeys? +## What Are Subkeys? A GPG identity doesn’t stop at one key pair. You can create **subkeys** under your primary key. These are used for specific tasks: @@ -55,10 +78,10 @@ your primary key. These are used for specific tasks: Subkeys are tied to your identity, but they can be revoked or replaced independently. -> ✅ Tip: Use subkeys for everyday tasks and keep your **primary key offline** or +> Tip: Use subkeys for everyday tasks and keep your **primary key offline** or > backed up securely. -## 🧱 Understanding the Primary Key +## Understanding the Primary Key Your **primary key** is your core identity. It: @@ -77,7 +100,7 @@ you. That’s why: ::: -## ✉️ How Encryption Works +## How Encryption Works Imagine you want to send a private message to someone: @@ -91,7 +114,7 @@ This ensures: - **Privacy**: No one but the intended recipient can read the message. - **Authenticity**: The recipient knows the message is from you. -## 🖋️ What Is Digital Signing? +## What Is Digital Signing? Signing is like sealing a document with your unique fingerprint. It allows others to: @@ -105,31 +128,49 @@ Digital signatures are used to: - Sign files or software packages. - Sign other people's public keys (to build trust). -## 📦 Real-Life Use Cases +## Real-Life Use Cases + +GPG is useful in many situations beyond email or software. Here are some +practical examples where encryption and digital signatures can protect your +privacy, secure your data, or build trust with others. + +### Protecting Cloud Backups + +You store sensitive files (like financial records or personal photos) in the +cloud. Before uploading, you encrypt them with your GPG public key. Even if the +cloud provider is hacked, only you can decrypt and access your data. + +### Sharing Passwords Securely -### Secure Email +You need to share a server password with a remote teammate. Instead of sending +it as plain text, you encrypt the password file with their public key. Only they +can decrypt and read it. -You want to email a sensitive document: +### Verifying Software Downloads -- Encrypt it using the recipient’s public key. -- Sign it with your private key. -- The recipient decrypts and verifies it. +You want to install open-source software from the internet. Before running the +installer, you check the author’s digital signature with GPG. If the signature +is valid, you know the file wasn’t tampered with. -### Software Publishing +### Securing Personal Notes -You release a file or program online: +You keep a journal or confidential notes on your laptop. You encrypt these notes +with your own public key. Even if your device is stolen, no one else can read +your information. -- You sign it. -- Users can verify the signature before using it. +### Proving Document Authenticity -### Building Trust +You sign a PDF contract before sending it to a business partner. They can verify +your digital signature to confirm the document really came from you and hasn’t +been altered. -You meet someone at a conference: +### Open Source Contributions -- You exchange and sign each other’s keys. -- Anyone who trusts your key may now also trust theirs. +You contribute code to an open-source project on GitHub. You sign your commits +and tags with your GPG key, so everyone knows the code changes are really from +you. -## 🏷️ Public Key Certificates +## Public Key Certificates A public key in GPG/PGP is not just a raw cryptographic key. It is always packaged as a certificate, which contains more than just the key itself. @@ -162,7 +203,7 @@ When you share your public key, you are actually sharing a certificate that: This is why you should always distribute your full public key certificate—not just the bare key! -## ✅ Best Practices for New Users +## Best Practices for New Users 1. **Back Up Your Keys**: Store your private key and revocation certificate in a secure, offline location. @@ -177,7 +218,7 @@ just the bare key! 6. **Understand the Web of Trust**: GPG builds trust by people signing each other's keys — this forms a decentralized trust model. -## 🧰 Where Does GpgFrontend Fit In? +## Where Does GpgFrontend Fit In? While GPG/PGP itself is powerful, it is mostly command-line based — which can be intimidating for beginners. @@ -200,7 +241,7 @@ Whether you're just starting to explore encrypted communication or already managing multiple keys, GpgFrontend acts as a bridge — combining the strength of GPG with simplicity and clarity. -:::tip[] +:::tip You focus on **secure communication** — let GpgFrontend handle the complexity behind it. |