Results 1 to 7 of 7

Thread: Encrypt with right click safe?

  1. #1
    Join Date
    Nov 2009
    Beans
    699

    Encrypt with right click safe?

    Tell me if I'm wrong.

    I just found a neat way to encrypt a file in Ubuntu 10.04.

    I right click on a file and select the Encrypt option. The program
    prompts me to "Choose Recipient" so I choose myself on the list. Then it
    prompts me to enter my passphrase.

    Once all that's done I hit enter and it adds .pgp to the end of whatever
    file just encrypted. The same basic method is used to Sign the file.

    Does it sound as though what I said is correct and that the file I wanted to encrypt was indeed encrypted?

    Can anyone crack my files without the passphrase? I'm sure it depends
    on the complexity and length of the passphrase.


    Thanks.

  2. #2
    Join Date
    Nov 2005
    Location
    Nashville, TN
    Beans
    437
    Distro
    Ubuntu 14.04 Trusty Tahr

    Re: Encrypt with right click safe?

    PGP and OpenPGP are two of the most trusted encryption programs available.

    The security of your encrypted file revolves around the complexity of your passphrase and the security of your private keys. It's not feasible to attempt brute forcing a pgp encrypted file without the private keys to begin with, and if someone does manage to get your private keyring they still have to brute force your passphrase. If your passphrase is something like "The drunken fox ducked the b@r t@b and kicked th3 tripping cow over the m00n" it's not likely to be brute forced.

    In the past the FBI has been known to install keyloggers on high profile suspect's computers to get their passphrases.
    -Chayak

  3. #3
    Join Date
    Nov 2009
    Beans
    699

    Re: Encrypt with right click safe?

    Thank you.

    Isn''t my private key readily available on my computer?

    All I do have to do is enter; gpg --list-secret-keys and I get to see the secret key.

    Also, on my other computer I can't do the "right click" and select Encrypt for any file as there's no option to encrypt the file.

    Why's that and how do I fix it?

  4. #4
    Join Date
    Nov 2005
    Location
    Nashville, TN
    Beans
    437
    Distro
    Ubuntu 14.04 Trusty Tahr

    Re: Encrypt with right click safe?

    Your private keyring is in the .gnupg directory of your home folder. I know some people who keep theirs on flash drives, one in an ironkey encrypted flashdrive.

    You can get the right click encryption by

    Code:
    sudo apt-get install seahorse-plugins
    Then the easiest thing to do is log out and log back in and you'll have the option to encrypt when you right click.
    -Chayak

  5. #5
    Join Date
    Feb 2006
    Beans
    457

    Re: Encrypt with right click safe?

    Quote Originally Posted by PDA1 View Post
    ...All I do have to do is enter; gpg --list-secret-keys and I get to see the secret key...
    Physical access is all; you could make things harder by employing fulldisk encryption along with passwording the bios and never letting the kit out of your sight

  6. #6
    Join Date
    Nov 2009
    Beans
    699

    Re: Encrypt with right click safe?

    That's great! The Seahorse plugins were installed and now I can encrypt with the right click method.

    As the public and secret rings are located on .gpupg, if my computer gets stolen then whoever has enough brains in their head to understand Ubuntu they could find my rings at the aforementioned location and wreak some havoc using my machine.

    I assume the passphrase, only known to me, is the strong link in the chain and the thief not knowing the passphrase renders the system largely uselesss.

    Is that assumption correct?

  7. #7
    Join Date
    Dec 2009
    Beans
    121
    Distro
    Ubuntu 14.04 Trusty Tahr

    Re: Encrypt with right click safe?

    Quote Originally Posted by PDA1 View Post
    That's great! The Seahorse plugins were installed and now I can encrypt with the right click method.

    As the public and secret rings are located on .gpupg, if my computer gets stolen then whoever has enough brains in their head to understand Ubuntu they could find my rings at the aforementioned location and wreak some havoc using my machine.

    I assume the passphrase, only known to me, is the strong link in the chain and the thief not knowing the passphrase renders the system largely uselesss.

    Is that assumption correct?
    The secret key is encrypted with CAST5 by default (man gpg). It's the same default as for the symmetric encryption. So, unless you keep the secret key separately from encrypted files, there is no advantage in encryption of your files using your own public/private keys.

    Dolphin, when kgpg is installed, lets you right-click-encrypt using the symmetric encryption that you can use without having to have your keys around (the terminal command is gpg -c).

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •