

Encrypting filesĪfter both participants have imported the public key of the other person, you can start encrypting the file. You can open the document and copy the content and the program will automatically import the public key or you import it by opening GPG suite and press on "Import" on top. You should never ever share your private key! After sharing your public key with your colleague he needs to follow the same procedure and send you their public key. The easiest is to export it as a file and send it to the other person on Slack. You can right-click on the key in the program and you have several options to share the key. As we have learned in the video we need to share our public key somehow. Screenshot of generating a key pair in GPG SuiteĪfter this, you can find your key in the list. You can find the installer on the homepage:
Copy paste private key into gpg suite download#
GPG suite setupįirst, you need to download the program on your Mac. It explains the concept quite well and we can see that both of the participants need to have a private key to make the encryption work, but no stress - this will be solved by GPG Suite. The best explanation which I have found is this video: To explain this procedure an own blog article would be needed but there are a lot of resources out there which can be used. This standard is an implementation of private-public-key encryption. It is an implementation of the OpenPGP protocol which implements the standard RFC4880. Before using the tool we should understand how the techniques used by this program are working. There is a solution for this on macOS though which is called GPG suite.

This can be dangerous and that is why files should be encrypted. When not encrypted, then Slack will have access to the file in one way or the other. In normal cases, this file is then shared on the company internal slack. Imagine a CSV file to be shared which is looking similar to this: file includes a lot of private customer data which should not be shared to 3rd-party software. When customer data is involved this process is becoming security-relevant. In every company, files are shared in some kind of way.

Copy paste private key into gpg suite mac#
Send both the Ubuntu public key and the encrypted '' file to the Mac.On your Ubuntu, check the fingerprint of the received key and encrypt 'key.gpg' with it, also signing it with you own key.On your Mac, create a temporary key pair send the public part to your Ubuntu machine.If you need to use a insecure channel to transfer the private key, such as email or other network based channels (where you don't have proper certificates ensuring that you are really communicating with the correct machine), you must use PGP (or some other method) to keep you private key secure: You should be able to import the key via the graphical GPG Keychain, or through the command line ( gpg -import key.gpg). Then you should transfer this file to the Mac via a secure channel and import the keys on the recipient. Assuming that you are using GnuPG on Ubuntu.įirst, you should export them: gpg -export-secret-keys >key.gpg
