What is PGP/GPG Encryption? In 3 Minutes - PGP/GPG Tutorial for Beginners

แชร์
ฝัง
  • เผยแพร่เมื่อ 22 ส.ค. 2024

ความคิดเห็น • 283

  • @blaisenuthak
    @blaisenuthak 3 ปีที่แล้ว +52

    no joke the only person I've come across to actually explain this and make 100% total sense, pat yourself on the back bro you have a gift for teaching. I knew it was a super basic concept but people were just not fricken explaining
    it right one bit

    • @freddo7330
      @freddo7330 ปีที่แล้ว

      Mannn

    • @johngilgun7251
      @johngilgun7251 ปีที่แล้ว

      Agreed. So simple I could follow it easily. Thank you!

  • @1anya7d
    @1anya7d 7 ปีที่แล้ว +147

    Finally someone who can explain why you need two keys. Your cat is beautiful

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว +6

      Hahahah thank you, LanYarD!. Thanks for the comment :)

    • @kirstywebb1619
      @kirstywebb1619 6 ปีที่แล้ว +1

      Bald pussy haha

    • @MeDabby
      @MeDabby 5 ปีที่แล้ว

      LanYarD The Cat is beautiful!

    • @ShahFahad-zf3iz
      @ShahFahad-zf3iz 3 ปีที่แล้ว

      Bro they use 4 keys, 2 for encryption/decryption, 2 for signing/verifying.

    • @alexliam9786
      @alexliam9786 3 ปีที่แล้ว

      Sorry to be off topic but does someone know of a trick to get back into an instagram account??
      I was dumb forgot my account password. I love any tricks you can give me!

  • @sonyboybluespower
    @sonyboybluespower 2 หลายเดือนก่อน +7

    DFV rabbithole brought me here

  • @bryanwilson3486
    @bryanwilson3486 2 หลายเดือนก่อน +25

    What's in the box?

    • @MuffinMcFluffin
      @MuffinMcFluffin 2 หลายเดือนก่อน +2

      Bro, I'm here for it!!!

    • @JackMeoff46
      @JackMeoff46 2 หลายเดือนก่อน +3

      A cat. The roaring type

    • @ozmosize
      @ozmosize 2 หลายเดือนก่อน +1

      WHATS IN THE BOX

    • @SofT42069
      @SofT42069 2 หลายเดือนก่อน +1

      I have to poop

    • @user21562
      @user21562 2 หลายเดือนก่อน +1

      NOT A CAT

  • @miriamfeldhausen7031
    @miriamfeldhausen7031 8 ปีที่แล้ว +53

    This was a very short, sweet, and humorous explanation. Well done!

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +1

      +Miriam Cox Thank you! Hope you enjoyed the video :)

    • @markgarner6326
      @markgarner6326 6 ปีที่แล้ว +1

      Give me the keys

    • @FeRoOOo71
      @FeRoOOo71 2 ปีที่แล้ว

      @@markgarner6326 lol

  • @s70rk
    @s70rk 8 ปีที่แล้ว +138

    I know I'm derailing the subject here, but is the cat dead or alive?
    I just need to know.

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +15

      +s70rk Well, the answer to your question depends on if you are asking about the cat in real life, or the hypothetical situation where a cat gets encrypted and sent to your friend's computer. hahah

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว +24

      Its owner also happens to be Mr. Schrodinger.

    • @TheSlappinHappy
      @TheSlappinHappy 6 ปีที่แล้ว +3

      I knew someone had to ask that question lol, & someone had to answer it. Its both... The cat is comprised of many, what 8D shape? :)

    • @malikmuhammad2879
      @malikmuhammad2879 4 ปีที่แล้ว

      😊

    • @BxrHavik
      @BxrHavik 4 ปีที่แล้ว

      @@TheSlappinHappy haha xD

  • @khalidtw
    @khalidtw 4 ปีที่แล้ว +19

    Very laymen's yet comprehensive explanation. Thanks for the nice presentation. In 3 min you have you lock and unlock all the PGP fundamentals. Appreciate.

  • @colinrickels201
    @colinrickels201 2 ปีที่แล้ว +4

    Oh wow this is the most clear and pragmatic example of PGP I’ve ever seen. I don’t know why it’s always so over complicated and no one ever thinks to use real lock analogies. We’ll done

  • @BSingh-on4qr
    @BSingh-on4qr 4 ปีที่แล้ว +6

    Thank you so much. Such a simple explanation and good analogy. I'm submitting my first bug report and it requires encryption so this was very useful for a beginner.

  • @TheRobel333
    @TheRobel333 7 ปีที่แล้ว +20

    This is basically the RSA model. In fact, Philip Zimmerman, the man who created PGP, even noted that he used the RSA concept as a basis for his project.

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว +1

      Great remark!

    • @user-hs7qg5tt8t
      @user-hs7qg5tt8t 5 ปีที่แล้ว

      +AES

    • @TheMcdili
      @TheMcdili 5 ปีที่แล้ว +3

      @@user-hs7qg5tt8t It's not really AES. AES is symmetric cryptography that uses block cipher, based on a mathematical function where both sender and recipient have the same shared private key. There are no public key components of AES as far as I know.

  • @Paul-cp1lk
    @Paul-cp1lk 2 ปีที่แล้ว +2

    So 3 minutes ago I didn't understand.
    After this video I understand.
    THANK YOU

  • @hmmg355
    @hmmg355 2 ปีที่แล้ว

    This is the most easiest explanation that i have ever listen to. Thank you.

  • @cypherdryst1442
    @cypherdryst1442 8 ปีที่แล้ว +1

    I've been trying to figure out how this process worked for some time now and this video along with your comment in the comment section finally got me to understand. Thank you.

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +1

      I'm so happy this helped you, Cypher Dryst ! Please do let me know if you need help with anything else :) Cheers!

  • @spacecadet9680
    @spacecadet9680 2 หลายเดือนก่อน

    Oh here I go learning again……. I’ll fuckin, do it again. I’ve learned so much from this saga

  • @darrenraleigh1986
    @darrenraleigh1986 6 ปีที่แล้ว +13

    So I finally think you got me past the block that kept me from understanding this. Instead of public key and private key, I think of Locking Key and Unlocking Key.
    I keep my Unlocking Key safe somewhere, and send my Locking Key with the message. My friend uses my Locking Key I sent with my message to lock his response for the trip back to me. I use my Unlocking Key to read it, which I can do because my Unlocking Key recognizes that the message was locked using my Locking Key and knows that it's okay to unlock the response for me.
    Have I got that right?

    • @VictorDozalTutorials
      @VictorDozalTutorials  6 ปีที่แล้ว +2

      You got it 100% right, Darren :) Thinking about it as Locking and Unlocking keys is pretty smart. Way to gooo!!!

    • @shaolinmonk7262
      @shaolinmonk7262 2 ปีที่แล้ว +1

      How does he see it if he does not have the unlocking key?

    • @0Ciju0
      @0Ciju0 ปีที่แล้ว

      @@shaolinmonk7262 Both parties have a "locking" and "unlocking" key, otherwise you cannot have two-way communication.

  • @masistani
    @masistani 6 ปีที่แล้ว +4

    Simple and excellent explanation. Thank you.

  • @gus.jimenez
    @gus.jimenez 3 ปีที่แล้ว

    Thank you so much friend, nobody could explain it better than you. I saw many videos but no one explain it so clear. Thanks

  • @Prabasha93
    @Prabasha93 8 หลายเดือนก่อน

    starting an assignment on PGP for the very first time.... and stumbled upon this...
    MAN!!!! hands down the best explanation ever on the topic!!! simple and very easy to understand!!!

  • @charleslong3290
    @charleslong3290 7 ปีที่แล้ว +3

    great job explaining PGP. I have been trying to find a way for this to stick, so this certainly helped.

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว +1

      Hey Charles! You are very welcome. Thanks for taking the time to watch the video and comment :) More videos are coming soon!

    • @charleslong3290
      @charleslong3290 7 ปีที่แล้ว +1

      I passed the GIAC GSEC today and undoubtedly your video helped me to get past this exam. Without understanding PGP, this could make or break someone if they ware riding the line of pass and fail.

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว +2

      Holy cow, Charles! I didn't even know this video could cause such a big impact on someone! Thanks for that :) You just motivated me to create a few more videos. I'm very happy you passed your GIAC GSEC!

    • @charleslong3290
      @charleslong3290 7 ปีที่แล้ว +1

      Absolutely! :)

  • @mortenrobinson
    @mortenrobinson 8 ปีที่แล้ว +24

    Hmm... aren't all cats naked? That cat just looks bald!

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +1

      +Demonwhisper Cats just want you to think they are naked ;)

  • @tinamcguire4084
    @tinamcguire4084 2 หลายเดือนก่อน +1

    OP about to be raking up some new followers - see you on the moon!

  • @annam1860
    @annam1860 2 ปีที่แล้ว

    best explanation ive seen in my life

  • @ChainPenguin
    @ChainPenguin 5 หลายเดือนก่อน

    Now I understand. So many possibilities, everything makes sense now.

  • @Aikunle78
    @Aikunle78 7 ปีที่แล้ว +4

    Pretty Good Analogy of PGP. Thanks!

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      You're very welcome! Thanks for the comment and the view, Aikunle!

  • @bsp_learning7135
    @bsp_learning7135 5 หลายเดือนก่อน

    lol... this is my favourite video on internet!!!

  • @Buildwd
    @Buildwd 10 หลายเดือนก่อน

    you mastered feynman's technique in this video, thanks a lot !!!

  • @bloocifer
    @bloocifer 2 ปีที่แล้ว

    for some reason ive had a hell of a time wrapping my mind around this but i think i finally got it. i think what made me understand is thinking of it as "i already know their public key and it is saved in my keys. so i make a box and lock it with THEIR public key and send it to them. that way nobody who intercepts it can open it but him". i think it would be a lot easier to understand if u said this. Because u said "they have to send you their public key and a box" when in reality theyre not going to send u an empty box. You are the one who will create the box. right? i mean if we used email for example - we wouldnt get sent a blank email with a public key attached to it. We would write them an email and lock it with their public key that we already know ahead of time. Otherwise we wouldnt have anybody to send something to.

  • @artyfarty93
    @artyfarty93 2 หลายเดือนก่อน +4

    How deep does the rabbit hole go?

    • @JackMeoff46
      @JackMeoff46 2 หลายเดือนก่อน +1

      It goes up, only UP

  • @simsonlory1459
    @simsonlory1459 5 ปีที่แล้ว +5

    So ,since there exists a PKI (SSL) infrastructures for encryption, what 's the difference of these two?

  • @onehourmusic5334
    @onehourmusic5334 ปีที่แล้ว

    pretty good explaination

  • @DGen.official
    @DGen.official 2 หลายเดือนก่อน

    I don't know what this means, but I am buying more!

  • @centbasedigitalarcadesyste2450
    @centbasedigitalarcadesyste2450 4 ปีที่แล้ว +1

    so how does the cat get in the box? if you send the box with the public key only, this would mean we can only lock the box not unlock it. so how does the cat get in the box without using the end users private key? only part which is confusing me here. cause if the box is sent unlocked, (lets say it already has other data in it) would that not be encrypted any more during the send of the box to get the cat pic?

  • @mohammedsulemankhan6935
    @mohammedsulemankhan6935 2 ปีที่แล้ว

    PGE(Prety good explination).Loved the way you did it.

  • @casandrarajnarain1314
    @casandrarajnarain1314 5 ปีที่แล้ว

    BEST EXPLANATION EVER

  • @soldadopreciso
    @soldadopreciso 7 ปีที่แล้ว +1

    thanks pal , greetings from Ecuador 🇪🇨

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      You're very welcome DarkSoldier! Thank you so much for the comment :) Don't forget to subscribe!

  • @DanielCastillo-mv8yf
    @DanielCastillo-mv8yf 3 ปีที่แล้ว

    great and simple

  • @markferguson8433
    @markferguson8433 9 ปีที่แล้ว +1

    Loved your presentation.
    After that stumps me

  • @isragaytanmistico
    @isragaytanmistico 3 ปีที่แล้ว

    Best explanation ever...easy to understand. Thanks Vic!!!

  • @cryp0g00n4
    @cryp0g00n4 5 ปีที่แล้ว

    wow an explanation that couldn't have been done better nice job

  • @adamvongrej810
    @adamvongrej810 9 ปีที่แล้ว +1

    Great video mate!

  • @skinandphones9701
    @skinandphones9701 8 ปีที่แล้ว +2

    You say you can only unlock with private keys this is incorrect. you can encrypt with private keys and let users with your public key verify it is you.

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว

      +SkinAndPhones You are right, but not completely right. What you are talking about is not technically "encryption", it is called "signing".
      Here is a link to a nice explanation of "encryption" vs "signing":
      stackoverflow.com/a/1189651/3264373
      Cheers! ^_^

  • @portfedh
    @portfedh 2 ปีที่แล้ว +1

    Thanks for the short explanation. A detail I dont understand is: How do you know that the public key you are getting is really from you friend and not someone else?

    • @MasteredMagic
      @MasteredMagic 4 หลายเดือนก่อน

      You don’t. That’s the tricky part. A trust third party perhaps

  • @Sarahmint
    @Sarahmint 5 ปีที่แล้ว

    thats a cute naked cat. Love her

  • @andrewcarney8631
    @andrewcarney8631 2 ปีที่แล้ว

    A really great explanation - Thanks!

  • @jamesterrien8578
    @jamesterrien8578 7 ปีที่แล้ว +1

    good analagy and i like thye cat !!

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      Hey James! So happy you think so! :) haha. Thanks for the comment and for the view! I really appreciate it :D

  • @abrahr2420
    @abrahr2420 ปีที่แล้ว

    Superb, concise explanation! Thanks Victor, I have subscribed to your channel!!

  • @tareqqazi2029
    @tareqqazi2029 2 ปีที่แล้ว

    This video was PGE (Pretty good explanation)

  • @justicearcana55
    @justicearcana55 3 ปีที่แล้ว

    really good analogy!! thank u for the video

  • @daviddonadze221
    @daviddonadze221 7 ปีที่แล้ว +1

    hey man thank you so much for this simple video

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      Hey David, you're so very welcome! It's comments like this that make me want to keep creating content. It would greatly help me if you subscribed! :)

  • @wb6csh
    @wb6csh 3 ปีที่แล้ว +1

    Yes, my computer volume is turned all the way to maximum! Your audio is very low, just so you will know. You should be able to re-record over the poor sound track, correct?

  • @Rapannell36
    @Rapannell36 7 ปีที่แล้ว +3

    Ok I get the analogy, but how do I actually go about using PGP?

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      I will make a video about this soon. Stay tuned. Thanks for the comment, Rapannell36!

  • @allieluo3046
    @allieluo3046 6 ปีที่แล้ว +1

    Thanks man, it helped me a lot!

  • @KiwiCrip
    @KiwiCrip 3 ปีที่แล้ว

    Thank you so much for uploading this vid. Hopefully this will me on my endeavors 😁

  • @saravananc7167
    @saravananc7167 8 ปีที่แล้ว +1

    Great Explanation :) Thanks...

  • @ktdevelops1639
    @ktdevelops1639 4 ปีที่แล้ว +1

    wouldn't it be more secure to use my private key to lock(encrypt) the box(message) and then send out my public key to unlock(decrypt) the box(message)? A private key shouldn't be distributed. I know it can be used to lock and unlock....but in terms of best practices...private key shouldn't be distributable. correct??

  • @KonstantinKalachev
    @KonstantinKalachev 8 ปีที่แล้ว +2

    Easy, clear explanation, thanks!!!

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว

      +Konstantin Kalachev No problem :D Hope you enjoyed the video!

    • @Nivexity
      @Nivexity 8 ปีที่แล้ว

      +Victor Dozal I deleted my first question cause it was a bad explanation, how does a private key decrypt the message? and why can't a user use the public key to decrypt the same message they were going to send?

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +1

      +Yoshi That is a very hard question to answer in a simple manner. I don't think I could be able to explain it better than the person doing it in this page. security.stackexchange.com/questions/86595/why-cant-you-work-backwards-with-public-key-to-decrypt-a-message

  • @druglover
    @druglover 2 ปีที่แล้ว

    Bro I swear you are a legend I never understood this stuff until I watched this thank you sm

  • @8080VB
    @8080VB 3 ปีที่แล้ว

    Omg thank you

  • @sigilavigne
    @sigilavigne 9 ปีที่แล้ว +1

    Good explanation mate (y)

  • @tahirahmed96
    @tahirahmed96 4 ปีที่แล้ว

    Amazing thanks dude!

  • @arthurchome4118
    @arthurchome4118 3 ปีที่แล้ว +1

    That's not PGP, that's public key encryption. PGP means a party you trust -which has your public key- is used to generate a certificate that you pass to a third party you don't trust but trust the intermediate. You are using a third party to spread your public key.

  • @Kate_mn
    @Kate_mn 4 ปีที่แล้ว

    very clear, thank you

  • @gcodev
    @gcodev 2 ปีที่แล้ว

    thank you

  • @HoangQuocThinh-BDCAT
    @HoangQuocThinh-BDCAT 2 ปีที่แล้ว

    i just want to say that YOU ARE SO AWESOME thank you a lot TvT. People make this so complicated but you damn.. help me solve my confusion in minutes. hfbuzohhihiy i dont know what to say but i really am happy rn thanks againnn

  • @gordonschlag
    @gordonschlag 7 ปีที่แล้ว +1

    Hi everyone the first time I ran pgp was in 1998 or 1999 to learn about encryption . At that time if my memory is correct the guy that wrote the program was under threat of being thrown in jail because he would not give the key to the N S A ( the key to his encryption softwares math the back door) and ( as a side note the military was interested in it because it was unbreakable). At that time anyone that wrote an encryption program was required by law to to give the key to the N S A . I lost interest in encryption because I had nothing of value to hide and did not keep up on the subject so I do not know the law at this time, but with our reliance on the internet and all our electronics i.e. computers, phones and such there is a need for encrypting your info. But we need to be mindful of what we are using and if it is legal . What I mean by that is if the N S A doesn't the key just by having your grandmothers secret apple pie recipe encrypted with any encryption software you could be breaking the law. While I have stated I lost interest and did not keep up on the subject I have to admit I do not know the current laws . It is not a recognized defence that you did not know that what you were doing was illegal. And no I am not a lawyer and am not giving any legal advice. Thanks victor and good job.

  • @FeRoOOo71
    @FeRoOOo71 2 ปีที่แล้ว +1

    but how the friend would get the privet key in the first place?

  • @fibzy02
    @fibzy02 8 วันที่ผ่านมา

    Okay, but this example just doesn't really make any sense
    We lock a box using key A, send it back, and the original sender opens it with key B? We're not even using lock B..
    I think it's more like: We have a box with a lock and 2 keys for it. The public key can close the box, but only the private key can open it back up. And also there is a case where we lock a box with a private key and everyone with public can open it

  • @sindhuchinniah4363
    @sindhuchinniah4363 6 ปีที่แล้ว

    Victor Dozal.. Thank You so much

  • @shawnbrown9876
    @shawnbrown9876 ปีที่แล้ว

    Thanks

  • @miikatmp5873
    @miikatmp5873 2 ปีที่แล้ว

    What if the thief uses crow bar to unlock the locked box?
    Solution:
    Train your cat to attack the thief when he opens the box and rip his neck with its sharpened claws. Also equip the cat with crowbar holster and teach how to get the cat to holster crowbar. Then it brings it to you. Now you obviously sell the crowbar and you now are able to buy fur coat to your cat to keep it warm.
    You are welcome.

  • @mrhallman64
    @mrhallman64 4 ปีที่แล้ว

    great way to explain it!!

  • @nadizalediwara1383
    @nadizalediwara1383 9 ปีที่แล้ว +1

    thank u. it is great video. is public key from sender? is private key from receipient?

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว +1

      +nadiza lediwara No problem! That is correct. Private key ALWAYS stays with the person receiving a message. Hence the word "private". Public keys are meant to be shared with the world. Senders need the recipient's public key. Hope that helps!

  • @navycorpsman9291
    @navycorpsman9291 4 ปีที่แล้ว +1

    Knowing my friends...they’d keep the box and send the Cat back 😝😝😝😝

  • @whyamiherenow5122
    @whyamiherenow5122 5 ปีที่แล้ว

    I don't think I will forget your cat explanation

  • @jjeiprathap4084
    @jjeiprathap4084 2 ปีที่แล้ว

    must we create new public keys for each different individual we send messages?

  • @behnamanisi1
    @behnamanisi1 8 ปีที่แล้ว +1

    amazing brother

    • @VictorDozalTutorials
      @VictorDozalTutorials  8 ปีที่แล้ว

      +Behnam Anisi Hope it helped :)

    • @Corn0nTheCobb
      @Corn0nTheCobb ปีที่แล้ว

      "Amazing brother" reminded me of this line by Kendrick Lamar (linked to exact timestamp):
      th-cam.com/video/v6HBZC9pZHQ/w-d-xo.htmlm16s

  • @discoverydavid
    @discoverydavid 6 ปีที่แล้ว

    Good video....Toight like a Tiger!

    • @VictorDozalTutorials
      @VictorDozalTutorials  6 ปีที่แล้ว

      Hahaha. Thank you so much for the great comment, David. Cheers!

  • @bludude41
    @bludude41 5 ปีที่แล้ว +2

    But how do you get the private key to the person you're trying to send the message to?

    • @VictorDozalTutorials
      @VictorDozalTutorials  5 ปีที่แล้ว +2

      Thanks for the question! The answer is: You do not get the private key of anyone. You only get their public key :) I hope that helps!

  • @mangeshxjoshi
    @mangeshxjoshi 3 ปีที่แล้ว

    good explanation , can we use external pgp keys to integrate / use in aws S3 to decrypt aws S3 files . or do we need to use external utility to decrypt files first using pgp key and then we can use that file in aws env for further processing

  • @abhiagarwal281295
    @abhiagarwal281295 4 ปีที่แล้ว

    The public key is broadcasted is not only meant for you. How will your friend ensure that it was you, not someone else, who used the public key to lock? How are you ensuring non-repudiation here.

  • @BAlishan80
    @BAlishan80 9 ปีที่แล้ว +1

    thanks

  • @tomgivoni8911
    @tomgivoni8911 ปีที่แล้ว

    fuck me that was so simple I love it!

  • @MrKachannie
    @MrKachannie 5 ปีที่แล้ว

    I think I understood

  • @hirdeleke05
    @hirdeleke05 2 ปีที่แล้ว

    great

  • @multitudes389
    @multitudes389 4 ปีที่แล้ว

    I got it!

  • @thegibbonslad
    @thegibbonslad 6 ปีที่แล้ว +6

    need a ffffn stetascope to hear this

    • @VictorDozalTutorials
      @VictorDozalTutorials  6 ปีที่แล้ว

      Dangit, I'm sorry for the low volume, thegibbons! Out of curiosity (I just want to make sure), are you 100% certain the video sound and your computer's sound was all the way up? Let me know pretty please. Thaaaanks!

    • @senukamunasinghe1648
      @senukamunasinghe1648 3 ปีที่แล้ว

      @@VictorDozalTutorials the video sound is low man I have the same issue !

  • @stevenharris4933
    @stevenharris4933 7 ปีที่แล้ว +1

    It sounds like this is protection for information sent by e-mail. I am assuming this will not help encrypt information like a social security number or a birth date on a online form?

    • @VictorDozalTutorials
      @VictorDozalTutorials  7 ปีที่แล้ว

      Hey there Steven Harris! Thanks for the comment. This encryption tool allows you to protect literally anything you want, but it is up to the person that created the online form to be able to accept anything related to pgp encryption.
      I hope this helps :) Cheers!

  • @littlenewton6
    @littlenewton6 ปีที่แล้ว

    PGP的原理很好理解,无非就是一个非对称密码的直接应用。但是我很难把它与Linux debian 的apt keyring联系起来。

  • @liminos
    @liminos 6 ปีที่แล้ว +3

    What you explained is not PGP but simply every generic asymmetric public-private-encryption..

    • @VictorDozalTutorials
      @VictorDozalTutorials  6 ปีที่แล้ว +1

      I guess this is true, but PGP and GPG are both using public-private-encryption, so wouldn't that make this explanation correct?

    • @kaszaq
      @kaszaq 5 ปีที่แล้ว

      @@VictorDozalTutorials no it wouldnt as people who come here are not looking for understanding what is public/private key but pgp and this video has nothing to do with that regardless to what title says

  • @zanetruesdale8336
    @zanetruesdale8336 2 หลายเดือนก่อน

    you're about to get a whole bunch of new comments...

  • @stevenziegler2523
    @stevenziegler2523 2 ปีที่แล้ว

    are you able to tell if a person has read a message using PGP, if so how?

  • @saktinaik6858
    @saktinaik6858 6 ปีที่แล้ว

    well explained

  • @joelsubash3222
    @joelsubash3222 5 ปีที่แล้ว +1

    Awesome

    • @VictorDozalTutorials
      @VictorDozalTutorials  5 ปีที่แล้ว +2

      Thank you for the comment Joel. I really appreciate it!

  • @0Ciju0
    @0Ciju0 ปีที่แล้ว

    So PGP & GPG are the same thing?

  • @BxrHavik
    @BxrHavik 4 ปีที่แล้ว

    That's Dr. Evil's cat! xD

  • @mr2octavio
    @mr2octavio 3 ปีที่แล้ว

    So we don't have anything else in the box?

  • @thegibbonslad
    @thegibbonslad 6 ปีที่แล้ว +1

    Volume on computer is normal, just some shows have poor volume,thanks

    • @VictorDozalTutorials
      @VictorDozalTutorials  6 ปีที่แล้ว

      I'll look into improving the volume for other videos. Thanks again for the reply, thegibbons!

  • @Flankymanga
    @Flankymanga 3 ปีที่แล้ว

    Actually private keys are used to lock the box and public keys are used to unlock... Why? Because those public keys are used to verify that the communication came from the owner of the private key.If you can decrypt a message from John Doe using his public key.. you know that John Doe had used his private key to encrypt that communication. And if you want to send a secret message that is only for John Doe... you use his public key to encrypt while he uses his private key to decrypt.

    • @teodorpeace1214
      @teodorpeace1214 3 ปีที่แล้ว

      Thank you so much for this explanation.

  • @scienceblossom6197
    @scienceblossom6197 5 ปีที่แล้ว

    so how does it differ from PKI?

  • @trieulieuf9
    @trieulieuf9 3 ปีที่แล้ว

    But 249,986 people have already seen your naked cat !!