TDNET 2.0: the New Homelab (Part 2)
Now, this is the second part of a two-part post, that one covered the tech and background, and this will be the tour. So, let’s begin, running this one front-to-back.
Continue readingNow, this is the second part of a two-part post, that one covered the tech and background, and this will be the tour. So, let’s begin, running this one front-to-back.
Continue readingSo this is a fun one, and likely a long one. Come, let’s talk about the unlikely backing for a decentralized, privacy-focused communications platform, the very weird ways in which IMAP can be used, and a hopefully final wrap-up to my streak of rambling about PGP.
Continue readingOkay, final thing on PGP after talking about PGP itself and Signature and trust levels, we have… How you can get someone else’s public key.
There’s a few common ways to do this:
CERT
recordTXT
recordOPENPGPKEY
recordLet’s discuss how they all work.
Continue readingSo last time we introduced the basics of how PGP works. This time, we cover something slightly more in-depth: signature types, and trust levels.
Continue readingPretty Good Privacy, or as it’s more commonly known as by its most popular client’s name, GNU Privacy Guard, is a method of encrypting and/or signing your messages using the power of public key cryptography. And, while it can get extremely complex, the basics of using PGP are, actually, pretty simple. So in the words of the great Angus Deveson, Let’s get started.
Continue reading