Tag Archives: encryption

How to setup OTR encryption in Pidgin

Writing proper howtos is so hard and time consuming. Copy/pasting them from other sites is so much easier. \o/

This time we ripped this tutorial from great website https://securityinabox.org Check it out for more articles and howtos about privacy and encryption

Source of the howto: https://securityinabox.org/pidgin_securechat

REMEMBER! Most of the settings in this tutorial, as well as general way of using OTR can be applied to any chat program supporting off-the-record encryption

How to Use OTR to Initiate a Secure Messaging Session in Pidgin

About Pidgin and OTR

Both your correspondent and yourself must configure the OTR plugin before you can enable private and secure Instant Messaging (IM) sessions. OTR plugin will automatically detect when both parties have installed and properly configured the OTR plugin.

Note: If you request a private conversation with a friend who has neither installed nor configured OTR, it will automatically send a message explaining how they can obtain the OTR plugin.

  Continue reading

How to setup and use gpg encryption with Thunderbird

Since there is Thousands of howtos and tutorials about GPG mail encryption on the web we decided that instead of writing yet another boring tutorial, just copy/paste an existing one. … PROFIT! If you want to see this and other tutorials from the mozilla foundation from whom we copied that tutorial (hope they don’t mind that), visit those links:

source of this article

mozilla foundation thunderbird support page



Digitally Signing and Encrypting Messages

Table of Contents

  • Introduction
  • Installing GPG and Enigmail
  • Creating PGP keys
  • Sending and receiving public keys
    • Sending your public key via email
    • Receiving a public key via email
  • Sending a digitally signed and / or encrypted email
  • Reading a digitally signed and / or encrypted email
  • Revoking your key

Continue reading

Keysigning party under the bridge – Wednesday May 6th

GPG is the free implementacion of the Pretty Good Privacy system. This allows you to sign and encrypt messages to other people, and if we sign each other our keys you can also verify that the person you know is who actually wrote the email.some color keys

Send your public key by mail to anybody from the #slug, and come over next Wednesday to get more people to sign it.

Encryption is not as complicated as it sounds, check out this howto for making your own gpg key in case you don’t have one yet, this video tutorial for using Thunderbird Enigmail plugin, and this other tutorials for GPG.

What you can bring to the party:

  • Little pieces of paper with your gpg key information (specially your fingerprint).
  • Fruits, tea, juice.
  • You don’t need to take your computer
  • You don’t need to take your id (Yes, in all the howtos talks about the ID but we don’t need it)
  • Don’t forget to send your gpg public key to the organizer

What you will have after the party:

  • A list of people you can mail encrypted mail with
  • A list of keys to sign and make a bigger trust ring
  • More information about gpg programs and gpg security

Why we do this:

Is important to increase the amount of encrypted mail to make it more difficult to analize and decrypt. The safety of encryption systems is a balance between the amount of information to decypher and the computing power of the spy… if we have enough encrypted mail they will never reach to decrypt the more importatn ones!

This week Security and Paranoia on Internet @ Barcelona CopyLeft

Saturday 21st of June

Workshop on basic knowledge for using internet safely.

First part: the difference between “clear” browsing and “encrypted” browsing, and OTR (encryption protocol for Instant Messaging).

Second part: introduction to GPG (Gnu Pretty Guard), a system that allows people to encrypt and sign data and communications.

Third part: Tor and the onion network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

See you there at 15.00 then!

@ Barcelona CopyLeft Van Boetselaarstraat 1 A*damflyer