Writing proper howtos is so hard and time consuming. Copy/pasting them from other sites is so much easier. \o/
This time we ripped this tutorial from great website https://securityinabox.org Check it out for more articles and howtos about privacy and encryption
Source of the howto: https://securityinabox.org/pidgin_securechat
REMEMBER! Most of the settings in this tutorial, as well as general way of using OTR can be applied to any chat program supporting off-the-record encryption
How to Use OTR to Initiate a Secure Messaging Session in Pidgin
About Pidgin and OTR
Both your correspondent and yourself must configure the OTR plugin before you can enable private and secure Instant Messaging (IM) sessions. OTR plugin will automatically detect when both parties have installed and properly configured the OTR plugin.
Note: If you request a private conversation with a friend who has neither installed nor configured OTR, it will automatically send a message explaining how they can obtain the OTR plugin.
Since there is Thousands of howtos and tutorials about GPG mail encryption on the web we decided that instead of writing yet another boring tutorial, just copy/paste an existing one. … PROFIT! If you want to see this and other tutorials from the mozilla foundation from whom we copied that tutorial (hope they don’t mind that), visit those links:
source of this article
mozilla foundation thunderbird support page
Digitally Signing and Encrypting Messages
Table of Contents
- Installing GPG and Enigmail
- Creating PGP keys
- Sending and receiving public keys
- Sending your public key via email
- Receiving a public key via email
- Sending a digitally signed and / or encrypted email
- Reading a digitally signed and / or encrypted email
- Revoking your key
GPG is the free implementacion of the Pretty Good Privacy system. This allows you to sign and encrypt messages to other people, and if we sign each other our keys you can also verify that the person you know is who actually wrote the email.
Send your public key by mail to anybody from the #slug, and come over next Wednesday to get more people to sign it.
Encryption is not as complicated as it sounds, check out this howto for making your own gpg key in case you don’t have one yet, this video tutorial for using Thunderbird Enigmail plugin, and this other tutorials for GPG.
What you can bring to the party:
- Little pieces of paper with your gpg key information (specially your fingerprint).
- Fruits, tea, juice.
- You don’t need to take your computer
- You don’t need to take your id (Yes, in all the howtos talks about the ID but we don’t need it)
- Don’t forget to send your gpg public key to the organizer
What you will have after the party:
- A list of people you can mail encrypted mail with
- A list of keys to sign and make a bigger trust ring
- More information about gpg programs and gpg security
Why we do this:
Is important to increase the amount of encrypted mail to make it more difficult to analize and decrypt. The safety of encryption systems is a balance between the amount of information to decypher and the computing power of the spy… if we have enough encrypted mail they will never reach to decrypt the more importatn ones!
Saturday 21st of June
Workshop on basic knowledge for using internet safely.
First part: the difference between “clear” browsing and “encrypted” browsing, and OTR (encryption protocol for Instant Messaging).
Second part: introduction to GPG (Gnu Pretty Guard), a system that allows people to encrypt and sign data and communications.
Third part: Tor and the onion network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
See you there at 15.00 then!
@ Barcelona CopyLeft Van Boetselaarstraat 1 A*dam