Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Encrypting Your Email: What Is PGP? Why Is It Important? And How Do I Use It?

The basics of encrypted communication.

Thinkstock / moodboard

In the summer of 2013, the U.S. woke up one morning to learn that NSA subcontractor Edward Snowden had dumped some of the federal government’s biggest secrets on the front pages of newspapers worldwide. As we would later learn, Snowden’s revelations became headlines because he was able to reach out to journalists using encrypted communications under the now-infamous nom de guerre “Citizenfour.”

For many folks, these cloak-and-dagger-style stories are the norm for talking about encryption. Taking the proper steps to secure your emails can seem intimidating, but it’s really not so tough. For your consideration, here’s more information on the free-to-use cryptographic tool PGP, and how you can get this software up and running.

But first, some basics:

In 1991, programmer Phil Zimmermann created the cryptography software PGP, or Pretty Good Privacy. Preceding the dot-com boom, the early ’90s tech world was obsessed with crypto-computing, presciently fearful of corporate and government intrusion in the emerging digital age. In a since-updated manifesto, Zimmermann laid out the case for using PGP by invoking the Bill of Rights, invasive government legislation, COINTELPRO and a bunch more historical precedent. The Justice Department would go on to investigate Zimmermann before dropping its case in 1996.

Zimmermann’s cryptography work has made him a celebrated figure in the tech industry (he’s an Internet Hall of Fame inductee), and his expertise has kept him relevant; Silent Circle, the encrypted communications company he co-founded in 2012, has raised $80 million since it launched.

Back to PGP.

The encryption technology itself works like this: There are two keys — one public, one private — required to encrypt and decrypt a secure message sent using the system. If you want to send your friend Mary a secure communication (provided you’ve downloaded the necessary tools, which we’ll get to in a minute), you download Mary’s public key and use that to send her the coded message. Mary’s public key has a corresponding private key (which only Mary should have), which she can use to decode the message.

But how do you verify Mary is really Mary? Couldn’t someone just claim his public key is really Mary’s, and that she really does need you to wire $5,000 to Nigeria? This is where cryptography’s “web of trust” idea comes into play.

The “web of trust” means that if I know Mary’s public key is really Mary’s public key, I can “sign” her key, which is an effective endorsement that she is, in fact, Mary. The “web of trust” holds that the more people authenticate one another’s keys and submit that signature to a key server (like the one at MIT), the more confident you can be that Mary is Mary.

For more details on the structure of PGP, the Electronic Frontier Foundation, International PGP Home Page and MIT all have useful FAQs and histories. To download PGP, here’s what you need to know.

First, the original PGP technology was bought by Symantec and is pretty much out of date, so now people have replaced it with a free software called the GNU Privacy Guard (GPG or GnuPG).

Second, there are a whole bunch of different ways to download and use encryption that have varying degrees of complexity and usefulness. For example, encryption on Mozilla’s Thunderbird mail client is the easiest to configure and probably your best bet. The EFF has a great Windows Thunderbird/GPG installation guide and one for Mac OS X as well.

If you don’t want to go the Thunderbird route …

Keybase.io is another straightforward service that authenticates your identity through other logins (Github, Twitter, Reddit, etc.), but you’ll have to sign up for the waiting list to join the program’s alpha launch. There’s also a Google Chrome extension for folks who prefer to go that route.

Mac users: The best guide/tutorial I’ve found is this one, from a guy on the Internet named Jerzy Gangi. It’s pretty straightforward. Thanks Jerzy!

Windows users: This archived post on Reddit has simple instructions, and it doesn’t take that long to finish.

This article originally appeared on Recode.net.

See More:

More in Technology

Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady
Future Perfect
Some deaf children are hearing again because of a new gene therapySome deaf children are hearing again because of a new gene therapy
Future Perfect

A medical field that almost died is quietly fixing one disease at a time.

By Bryan Walsh