aboutsummaryrefslogtreecommitdiffstats
path: root/manual
diff options
context:
space:
mode:
Diffstat (limited to 'manual')
-rw-r--r--manual/_navbar.md2
-rw-r--r--manual/_sidebar.md2
-rw-r--r--manual/basic-concepts.md94
-rw-r--r--manual/contract.md37
-rw-r--r--manual/faq.md14
-rw-r--r--manual/overview.md72
-rw-r--r--manual/quick-start.md29
7 files changed, 120 insertions, 130 deletions
diff --git a/manual/_navbar.md b/manual/_navbar.md
index 0a2397f9..80c0b1a3 100644
--- a/manual/_navbar.md
+++ b/manual/_navbar.md
@@ -1,6 +1,6 @@
<!-- _navbar.md -->
-- [Source Code(Develop Repo)](https://git.codesdream.com/?p=public/main/GpgFrontend.git;a=summary)
+- [Source Code(Develop Repo)](https://repo.stdv.de/?p=public/main/GpgFrontend.git;a=summary)
- [Document](https://doxygen.gpgfrontend.bktus.com)
- [Manual](overview.md)
- [Downloads](downloads.md)
diff --git a/manual/_sidebar.md b/manual/_sidebar.md
index f07fb50a..25af0716 100644
--- a/manual/_sidebar.md
+++ b/manual/_sidebar.md
@@ -2,7 +2,7 @@
- [Overview](overview.md)
- [Quick Start](quick-start.md)
- [Downloads](downloads.md)
- - [Basic concepts](basic-concepts.md)
+ - [Fundamental Concepts](basic-concepts.md)
- Manual
- [Understand Interface](manual/understand-interface.md)
- [Encrypt & Decrypt Text](manual/encrypt-decrypt-text.md)
diff --git a/manual/basic-concepts.md b/manual/basic-concepts.md
index 3f7b68e4..7e397d2a 100644
--- a/manual/basic-concepts.md
+++ b/manual/basic-concepts.md
@@ -1,69 +1,53 @@
-# Basic Concepts
+# Fundamental Concepts
-If you don't know GPG, or PGP, you may need to learn some basic concepts here
-before using Gpg Frontend. This reduces the chance of you making mistakes, such
-as distributing your private key to the world.
+If you're unfamiliar with GPG or PGP, it would be beneficial to learn some
+fundamental concepts before using GpgFrontend. This can help prevent potential
+mistakes, such as accidentally sharing your private key.
-## The most basic concepts you must know
+## Essential Concepts
-To begin using GPG, you must first generate a key pair, which can be thought of
-as a key ring. Each key pair includes at least two keys: a public key and a
-corresponding private key. Together, these keys form a key pair. It is possible
-for a key pair to include multiple public keys and their corresponding private
-keys, but this will be explained later.
+Before you start using GPG, you need to generate a key pair, analogous to a key
+ring. Each key pair comprises at least two keys: a public key and a
+corresponding private key. It is possible for a key pair to contain multiple
+public keys and their associated private keys, which we'll discuss later.
-The public key can be shared with others, allowing them to encrypt information
-they wish to send to you. The private key must be kept secure, as its disclosure
-would render your encryption ineffective.
+The public key can be shared with others, allowing them to encrypt data they
+want to send you. Conversely, the private key should remain confidential since
+its exposure can compromise your encryption.
-It is important to understand that the public key is used for encryption and
-that any ciphertext encrypted using your public key can only be decrypted using
-the corresponding private key of your key pair. This process relies on
-cryptographic principles and is trustworthy unless your private key is known to
-someone else. The reverse process is also valid: you can encrypt a message using
-your private key and someone else can decrypt it using your public key. This
-process establishes a mechanism for signing and verifying information.
-Information encrypted with the private key can be considered a signature, and
-others can use the public key to verify that the signature is valid.
+It's vital to understand that the public key is used for encryption, and the
+ciphertext encrypted with your public key can only be decrypted using your key
+pair's corresponding private key. This process is based on cryptographic
+principles and is reliable unless your private key gets compromised. Similarly,
+you can encrypt a message with your private key, and someone else can decrypt it
+using your public key, establishing a signature verification mechanism.
-For most users, it is not necessary to understand the cryptography behind GPG,
-but it is helpful to remember the basic principles described above. For those
-interested in learning more, further reading is recommended.
+While understanding the underlying cryptography of GPG isn't necessary for most
+users, remembering these basic principles can be beneficial.
-## Multiple pairs of public and private keys in a key pair
+## Multiple Pairs of Public and Private Keys in a Key Pair
-In a key pair, there is always at least one public-private key pair, but there
-is no limit to the maximum number of pairs. It is possible to generate
-additional pairs of public and private subkeys and add them to the key pair.
-However, it should be noted that the newly added subkeys are identical to the
-original pair, as each pair consists of one public key and one private key,
-which we refer to as the primary key pair.
+A key pair always contains at least one public-private key pair, but there's no
+maximum limit. It's possible to generate additional public and private subkeys
+to add to the key pair. Each pair consists of one public key and one private
+key, which we refer to as the primary key pair.
-Users can specify the purpose of each subkey pair. For instance, the first key
-pair can be used for encryption and decryption, the second for signing and
-verification, and the third for both encryption/decryption and
-signing/verification. It is important to specify the intended usage when
+Users can specify the purpose of each subkey pair. For instance, the first pair
+can be used for encryption and decryption, the second for signing and
+verification, and so forth. It's important to define the intended usage when
generating subkeys.
-The master key is automatically generated when the key pair is created, and
-users can add subkeys as needed.
+The primary key is automatically generated when creating the key pair, and users
+can add subkeys as needed. When generating the primary key or subkeys, users can
+select algorithms such as RSA or DSA.
-When generating the master key or subkeys, users can select algorithms such as
-RSA or DSA. It is not necessary to understand the underlying principles of these
-algorithms. However, it is important to note that subkeys generated by certain
-algorithms may only perform specific processes, such as signing and
-verification, and cannot perform others, such as encryption and decryption.
-Additionally, for RSA, users can choose the key length when using the algorithm.
+## The First Pair of Public and Private Keys in a Key Pair (Primary Key)
-## The first pair of public and private keys in a key pair (primary key)
+The initial public-private key pair (primary key) in a key pair is crucial as
+all subsequent subkeys are tied to it. If the primary key is compromised, they
+could generate subkeys based on that information and impersonate the key owner.
-The initial public-private key pair (master key) in a key pair is crucial, as
-all subsequent sub-keys are linked to it. If someone were to obtain the master
-key (including both the public and private key information), they could generate
-sub-keys based on that information and use them to impersonate the key owner and
-communicate with others.
-
-Therefore, it is essential that the private key of the master key is kept
-confidential, while the public key can be shared with others. If the private key
-of the master key is compromised, it renders the entire key pair vulnerable and
-must be immediately discontinued.
+Therefore, it's crucial to keep the primary key's private key confidential,
+while the public key can be shared. If the private key of the primary key is
+compromised, it makes the entire key pair vulnerable and its use should be
+immediately discontinued. \ No newline at end of file
diff --git a/manual/contract.md b/manual/contract.md
index 19d444f1..20903104 100644
--- a/manual/contract.md
+++ b/manual/contract.md
@@ -1,36 +1,39 @@
-# Contract
+# Contact
-We do not accept content related to business and politics on this platform, as
-this tool is meant for the benefit of all humanity. However, if you have any
-inquiries or suggestions regarding the technology and improvement of this
-software, please do not hesitate to contact me.
+Please refrain from sharing content related to business and politics on this
+platform, as this tool is designed for the betterment of all humanity. However,
+if you have any technical questions or suggestions for improving the software,
+please feel free to contact me.
-Please use plain text to reach out to me via email, as HTML is not preferred.
+Preferably, use plain text when reaching out to me via email, as HTML is not
+preferred.
-## About ME
+## About Me
-Name: Saturneric, Eric or Erich.
+Name: Saturneric, Eric, or Erich.
-Email: [[email protected]](mailto:[email protected]) (Hosted in the Federal Republic of Germany)
+Email: [[email protected]](mailto:[email protected]) (Hosted in the Federal Republic
+of Germany)
-Email Content Style: It is recommended to use plain text without HTML style rich text.
+Email Content Style: It is recommended to use plain text without HTML style rich
+text.
-About Domain Name: BKTUS(Bakantu union us) is not a company, it is my personal domain name.
+About Domain Name: BKTUS(Bakantu union us) is not a company; it is my personal
+domain name.
## Languages
-You can write to me in following languages.
+You can correspond with me in the following languages:
1. English
2. Chinese
-3. Deutsch
+3. German (Deutsch)
## GPG Public Key Info
-Here is the PGP public key that I have been using for a long time. You can use
-this public key to establish secure and encrypted communication with me. Please
-use plain text for any encrypted communication and avoid using rich text formats
-such as HTML.
+Here is my long-term PGP public key. You can use this public key to establish
+secure and encrypted communication with me. Please use plain text for any
+encrypted communication and avoid using rich text formats such as HTML.
```
-----BEGIN PGP PUBLIC KEY BLOCK-----
diff --git a/manual/faq.md b/manual/faq.md
index a5e61165..9d474460 100644
--- a/manual/faq.md
+++ b/manual/faq.md
@@ -3,16 +3,16 @@
## What is GpgFrontend?
GpgFrontend is a cross-platform encryption tool that adheres to the OpenPGP
-standard. Its goal is to simplify the use of OpenPGP, making it more accessible
-for individuals to protect their privacy.
+standard. Its objective is to make the use of OpenPGP simpler, thereby enabling
+more individuals to secure their privacy.
-## Relationship between OpenPGP(PGP) and GnuPG(GPG)?
+## What's the relationship between OpenPGP(PGP) and GnuPG(GPG)?
OpenPGP is a standard for data encryption and decryption, which is supported by
-GpgFrontend. GnuPG is a cryptographic software that is used for encrypting,
-signing, and managing keys for asymmetric cryptography, and it follows the
-OpenPGP standard. GpgFrontend operates GnuPG at runtime to perform various
-operations such as encryption and decryption.
+GpgFrontend. GnuPG is a cryptographic software that's used for encryption,
+signing, and key management for asymmetric cryptography, and it follows the
+OpenPGP standard. GpgFrontend utilizes GnuPG during its operation to perform
+various tasks such as encryption and decryption.
## How to obtain and use GpgFrontend?
diff --git a/manual/overview.md b/manual/overview.md
index 91511445..b87f20f8 100644
--- a/manual/overview.md
+++ b/manual/overview.md
@@ -46,8 +46,8 @@ aligns with the recommended configurations.
### Operating System
GpgFrontend is compatible with major operating systems including Linux, macOS,
-and Windows. Specifically, it recommends Windows 10 and later, macOS 10.15 High
-Sierra and later, and Ubuntu 18.04 LTS or other equivalent Linux distributions.
+and Windows. Specifically, it recommends Windows 10 and later, macOS 11 and
+later, and Ubuntu 20.04 LTS or other equivalent Linux distributions.
### Software Dependencies
@@ -95,53 +95,53 @@ support some new features of OpenPGP based on it and continue to improve it.
## Purpose
-The aim of GpgFrontend is to enable people worldwide, even those without command
-line or programming experience, to safely transmit information to their desired
-destination. Although free software is a common asset for all humankind, there
-are still many individuals who are unable to benefit from it due to their
-limited knowledge and usage habits. We need to break this cycle. GpgFrontend is
-dedicated to enhancing the ease-of-use and intuitiveness of the free software
-GnuPG, with the ultimate goal of making it accessible to a broader audience.
+GpgFrontend is committed to empowering people globally, especially those without
+command-line or programming expertise, to securely transmit information. While
+free software represents a shared asset for all of humanity, many individuals
+remain unable to leverage it due to limited knowledge or ingrained usage habits.
+Our mission is to break this cycle.
-The GpgFrontend project is as open source, and it also insists on using open
-source codes and libraries.
+We are dedicated to improving the user-friendliness and intuitive nature of the
+free software GnuPG, with the primary objective of expanding its reach to a
+wider audience.
+
+As an open-source project, GpgFrontend not only advocates for transparency and
+community participation, but also adheres to using open-source codes and
+libraries.
### Free forever
-GpgFrontend will be free forever, and you don't need to worry about being asked
-to pay a fee to use the software one day.
+GpgFrontend is committed to remaining free of charge indefinitely. You can rest
+assured that you will never be asked to pay a fee to use the software.
## Source Code
-The original code repository of Gpg Frontend is hosted on the server of Codes
-Dream, and each submission will be submitted to the code repository first. You
-can click
-[Here](https://git.codesdream.com/?p=public/main/GpgFrontend.git;a=summary) to
-visit the original code repository and track development progress.
+The primary code repository for GpgFrontend resides on the BKTUS server.
+Every update gets committed here first. You can visit the original [code
+repository](https://repo.stdv.de/?p=public/main/GpgFrontend.git;a=summary) to
+follow our development progress and stay updated on the latest changes.
-注意:中国用户请访问[这里](https://git.codesdream.com/main/GpgFrontend.git)
### License
-The source code for GpgFrontend is licensed under the GPL-3.0 license, which
-ensures that GpgFrontend is open-source software. You have the right to exercise
-the rights specified in the license, subject to compliance with the terms of the
-license.
+GpgFrontend's source code is licensed under the GPL-3.0 license, affirming its
+status as open-source software. You are entitled to exercise the rights outlined
+in the license, as long as you adhere to its terms and conditions.
-### Contribution
+### Contributing
-Furthermore, the addition of new features does not compromise the existing core
-functionality. As an individual, my capabilities are limited. Therefore,
-GpgFrontend welcomes volunteers to contribute to the project. You can file
-issues or submit pull requests through the GitHub platform. Additionally, you
-can submit your questions and code contributions via email. Please feel free to
-send problem reports and patches to me.
+We believe that adding new features shouldn't compromise existing core
+functionality. However, as an individual developer, my abilities are limited.
+Therefore, GpgFrontend warmly welcomes contributors. You can report issues or
+submit pull requests through GitHub. Additionally, questions and code
+contributions can be submitted via email. Feel free to send me your bug reports
+and patches.
-## Privacy Guarantee
+## Privacy Assurance
-GpgFrontend operates without servers, and does not require servers to be
-operational. While it utilizes the OpenPGP protocol for public key transfers, it
-does not collect or upload any additional information.
+GpgFrontend operates serverlessly, it doesn't require any server to function.
+Although it utilizes the OpenPGP protocol for public key transfers, no
+additional information is collected or uploaded.
-For users with elevated security requirements, a version of GpgFrontend will be
-available in the future which will not have internet access capability.
+For users with heightened security needs, a version of GpgFrontend will be made
+available in the future that lacks internet access capabilities.
diff --git a/manual/quick-start.md b/manual/quick-start.md
index b898005e..ecba884b 100644
--- a/manual/quick-start.md
+++ b/manual/quick-start.md
@@ -1,22 +1,25 @@
-# Quick Start
+# Getting Started
-GpgFrontend is cross-platform, which is one of its differences. For your operating system, you'll need to choose
-different ways to lay out GpgFrontend.
+One of the unique features of GpgFrontend is its cross-platform capability.
+Depending on your operating system, the installation process might vary.
-## Pre-conditions
+## Prerequisites
-**For Windows users or macOS users using Homebrew, you can just skip this section.**
+**If you are a Windows or macOS user with Homebrew, you can skip this section.**
-GpgFrontend runs dependent on basic functions provided by GnuPG, so you need to install GnuPG before you can run
-GpgFrontend. Why does GpgFrontend require users to install GnuPG separately? Starting with GnuPG 2.0, GPG relies on
-separate modules to do all of its functions. This requires that when using GPG, these modules all need to be in the
-correct location on your operating system so that the GPG can find them.
+GpgFrontend relies on the basic functions provided by GnuPG. Hence, it is
+necessary to install GnuPG before running GpgFrontend. Starting from GnuPG 2.0,
+GPG operates based on separate modules for all its functionalities. For GPG to
+operate smoothly, these modules must be correctly situated within your operating
+system.
-GnuPG is not be able to run in App Sandbox, so this situation has caused GpgFrontend to be temporarily unavailable
-in the Apple Store. I have tried for many times to bundle GnuPG into App Sandbox, but eventually failed.
+Unfortunately, GnuPG cannot operate within an App Sandbox, which is why
+GpgFrontend is currently not available on the Apple Store. I have attempted
+multiple times to integrate GnuPG into the App Sandbox but to no avail.
-In general, the latest Linux distributions offer a GnuPG 2.0 environment. You can check by typing `gpg --version` in the
-command line tool. **In general, it is recommended to install versions of GnuPG 2.1 and above.**
+By default, most latest Linux distributions come with a GnuPG 2.0 environment.
+You can verify this by entering `gpg --version` in the command line tool. **As a
+general recommendation, you should install versions of GnuPG 2.2 or higher.**
## Install & Run Steps