If you want easy to use PGP in the browser, there are plenty of options like Keybase, Enigmail, and Mailvelope.
https://www.google.com/settings/u/0/ads will tell you what google's figured out about you. It has an opt-out setting for "interest based" ads, which should at least make the web less creepy. If you're not logged into Chrome, I don't believe it sends much about you back, and that data's anonymized before transmission. But, Firefox is an obvious choice for staying private. It's better to keep your vendors separate when it's convenient.
If you're still using Facebook to stay close to friends/family, a big help is to dump the app and use the mobile website, preferably in its own browser. A private browsing tab that you keep open for it should work pretty well.
If you want a lot more web privacy, then a proxy service is the way to go. They are generally quite fast (unlike Tor), and you have choices between services to select one with a good reputation on privacy. If you want to go further, I'd consider putting together a OpenVPN machine image on Amazon, and then booting new VMs as you want. The old VM's state gets lost when you shut it down, so it's effectively like a "burn phone" VPN. Perhaps set up a few on different cloud machine vendors and rotate, to keep any vendor from getting a view themselves.
For email, it gets tougher. Email's underlying protocols aren't terribly secure -- despite efforts to make them so. You're basically stuck using PGP, which isn't actually too bad. For web-based mail, there's https://www.mailvelope.com/, and for desktop, you can choose out of quite a few clients. The PITA parts are still (a) getting your correspondents to use it; (b) key exchange.
Anyways, keeping people safe from Internet repression is my day job (you won't believe with who!), so please feel free to ping/msg if there's anything I can help with.
Mailvelope is a browser addon for PGP. It does key management (generation, import, export) in the browser and provides buttons for popular webmailers for en- and decryption.
FlowCrypt has some odd limitations compared to Mailvelope:
https://github.com/FlowCrypt/flowcrypt-browser/blob/master/LICENSE
*Edit: Also Mailvelope have been audited by Cure53 and have now been improved...
Pinging: u/Tanckom
Tell them about Mailvelope, when I first discovered this FF extension, I was hearing the sound of heaven. 10 years of GPG suffering was an end since then. Mailvelope is surprisingly easy to use.
I would guess that they would be somewhat less safe in Mailvelope, because some sort of browser exploit might be able to get to the unencrypted keys in memory.
Some security reviews of Mailvelope:
Just a quick Google brought this up which seems to recommend using GPGtools. Hope that helps! (I am a Windows user who just uses the mailvelope chrome plug in to manage my keys right now, so I don't know if this is the best practice for Mac)
> Getting secure encryption
Let's not put the cart before the horse here. Microsoft offers a huge amount of "encryption" with their data services, but Microsoft does all of the encrypting and has multiple backdoors into their encrypted data (even though they publically claim not to).
I'm interested to see how Yahoo! architects this solution before I take any credence in it's ability to thwart surveillance. It's likely explicitly designed with law enforcement backdoors. Do you think that Yahoo! really wants people peddling encrypted child pornography via their web services? Are they really going to turn around and tell the FBI and local law enforcement that they can't do anything? I doubt it.
In addition, you can already use Yahoo! Mail with Thunderbird's PGP plug in. I would recommend doing that long before attempting to use their "encryption" system.
[Edit:] This already in place: https://www.mailvelope.com
Then you might want to check out Mailvelope. It is a standalone version of the ProtonMail browser client for use with arbitrary webmail sysems. Here is the list of webmail providers with explicit support:
You could either use something like PGP, then share public keys between yourself and your recipient. Or you could potentially use something like https://www.mailvelope.com/en , which also uses PGP but intergrates it directly into the browser. If you need any help with either of these, just DM me.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.2.0 Comment: https://www.mailvelope.com
wcBMA99AS5xV4MboAQf/bwgupTQBCAXoBa2SBOSzN9AmSNk6Z19LXCoGXj7F 92eqLc5ROi2Cu73WYAmIS/uRoWy5XI6oiShip3GGzm/+Xq9e0BXQ6pPY6RN9 Hs2vinA+TmzZZHXLIZXV4aNEHx0zYhGswYPXyFMLxVqyddY9srSsQHGCgloE xoeXcKroAxBXM9h6mRJrP3vnyX3pO+SQ2CoS+/vxB6vAET5l4dPKsLC+MC/e zqXKv6+mWIsE0m2FKUBMquC5ymbyuz//bpVlUb0Z+FiIxXYoVM5t5B1fYapr HEdMIH+lRLztKbs+j6nQ0j4BjsT+dE8/HVUSR3Wpj7ZkEH1ic1J9jKJVD5QX /9J0AQkJlbc5gW9UGmRBCY6djzT5kEfukUcJ9B2fd5fe9anDLZV4GRXLH3ty gkhDYoYS1ctkCftvutioV5cCtRJOwHoOernz1ChdxG3/7Pjnq9wkf3pwEfWV PW+t5+WK7+W+S2GkrciTgYOJlBfMgE5sYqxrMMI= =lfGw -----END PGP MESSAGE-----
Google made an open source extension called End-to-End that is designed to work in Chrome with Gmail.
https://github.com/google/end-to-end
And then there is also Mailvelope: https://www.mailvelope.com/
At the very least use the Mailvelope extension with both the input (default) and out-put (not default) being in separate windows so Google or Microsoft don't get copies of your emails before you send them away or right after you decrypt them.
lol you use https://www.mailvelope.com/ as your pgp source, really?
good luck to anyone who tries this shit. even if they are legit you are trusting your address to someone who hasn't read an opsec 101 guide.
you can use a more secure email platform than gmail, there are many out there....but you must also learn to use GPG to encrypt your emails, that is important....there is a plugin for your browser so that you can encrypt your gmail messages easily too (https://www.mailvelope.com/). With encryption setup properly, you dont need to rely on the email platform for security. Decentralized video streaming would be awesome....you can already stream torrent files direct to your desktop, so its probably coming sooner rather than later. You should check out http://www.watchmybit.com its a youtube alternative that takes bitcoin, just for something a little different.
Using something OpenPGP based would make it so you could just make it a localized internal project with no requirement to go outside the company for certificates. You would still have to set it up.
There are various plugins for Outlook. Dunno how good any of them are.
If this is a rare requirement, it might be easier to just train the people involved how to do the encryption stuff standalone and dump the result in the email. Then they either can't do it or chances are they will of done it more or less right.
For webmail there is the reasonably user friendly Mailvelope which comes in the form of a browser plugin.
> when designing PM originally, use E2E encryption
> That's simply not possible. PM has no control over the email systems it sends and receives email from.
What I mean is, when PM designed their system originally, they could have said: we're not going to handle keys at all, we're going to tell users to do that on the client machine using open-source software such as PGP. That way the message will be E2E encrypted, neither PM servers nor other email servers will be able to read it. Only the destination user, who also will have to use PGP software on their client, will be able to read it.
These are things: https://www.mailvelope.com/en/ and https://linux.die.net/man/1/gpg
You can skip all the cruft and just do GPG on the command line on Windows if you want. Look for the "simple installer" for Windows here:
You could try Mailvelope with or without GnuPG which, for better or worse, runs in the browser.
All good ideas - our architecture is open so that's definitely the kind of things worth looking into. We have a PGP app already available today that's compatible with the OpenPGP card - so it'll work anywhere this would. We're building a new one to make it easier to access from a web application (to be integrated in something like https://www.mailvelope.com/en)
They mean as opposed to code controlled by the user ... which in the case of email encryption is a valid point because traditionally that is done with programs running on your device.
Presumably they would think something like mailvelope was better for webmail because it is a browser plugin and as a result would have to be subverted for everyone, not just an individual user.
I use fastmail and I love it. I used to switch around all the time but never again.
As for the encryption that it lacks, it’s easy to gain back using a free extension like mailvelope
Google once teased us with end-to-end, but just like all other attempts to get encryption integrated with providers of normally-insecure email it fell by the wayside.
Mailvelope had legs for a while but not sure if it's still widely used, I'm personally keeping an eye on Flowcrypt - word is they'll be adding PGP WKD support to find recipent keys which will be a big plus.
All these solutions are just fudges stuck on top of the GMail interface and likely to go tits-up at the slightest change to the UI, rather than being a built-in feature. Really you're as well just getting used to copy and pasting between whatever you use to encrypt messages and your client unfortunately.
Wow! I had no idea PGP was a company! I was just referring to the openpgp tool that gpg uses.
I have a hard time believing that any amount of force from the US government would be enough to pressure the open source community into building backdoors into openpgp and gpg. Any backdoors would simply be rejected.
Since the PGP technology is open source and out of anyone’s control, the first companies to take the blow are gonna be the ones that provide easy encryption like protonmail, tutanota, and hushmail. Since these technologies run very in-the-background, they’ll be able to build in backdoors (maybe adding a government controlled PGP key to all emails) without a fuss.
My question is about when users take encryption into their own hands. I personally use mailvelope to encrypt my emails. Mailvelope is open source and wouldn’t get away with building in a backdoor, so nobody has any control over my encryption but me. Since I’m sending encrypted emails over fastmail (lets say I’m misbehaving), would fastmail take the fall for providing me the means to send my encrypted messages?
This will be interesting to see what happens. Maybe the government will punish me for using encryption. Maybe the government will punish fastmail for allowing me to use encryption, which will cause them to terminate my account or detect and block emails with encryption.
THEN, I can use steganography to hide my messages! That will give me plausible deniability since it’s undetectable!
Long story short: I love computers, I hate the government, don’t tell me what to do, and the EARN IT bill is stupid.
> Using pgp in a regular email client is so hard to get anyone to do that I don't even know how! I assume there's email clients that integrate it seamlessly?
https://www.mailvelope.com/en/
Probably there are others.
> Do I need to worry about encrypting my files before sending them out
You should encrypt everything you share, but it's easy enough now that you don't need to worry about it.
​
Most popular email services like Gmail encrypt your files in transit, but you can use Mailvelope to secure your emails with E2E encryption from the browser itself.
The popular modern chat apps like Whatsapp and Telegram have E2E encryption enabled for all files by default.
> Do I need to worry about encrypting my files before sending them out
You should encrypt everything you share, but it's easy enough now that you don't need to worry about it.
​
Most popular email services like Gmail encrypt your files in transit, but you can use Mailvelope to secure your emails with E2E encryption from the browser itself.
The popular modern chat apps like Whatsapp and Telegram have E2E encryption enabled for all files by default.
You can use AnonAddy to encrypt all forwarded emails with your own GPG/OpenPGP key. Then use an extension like Mailvelope or Enigmail if using Thunderbird to decrypt them.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 I have verified the following PGP keys to be accurate: u/nopara73 PGP Fingerprint: 21D7 CA45 565D BCCE BE45 115D B4B7 2266 C47E 075E u/lontivero PGP Fingerprint: E36A CB3C 6D0A EAA4 BAE2 C597 AF1B 31FA DAA4 B340 u/molnardavid84 PGP Fingerprint: 1237 2872 D646 EB8E CB46 80F4 950F 6F91 2CFD E54C Max Hillebrand: E900 5F66 A86B B816 BD7D 967E BEDC D95C 42AC 3C57 Trust but Verify -----BEGIN PGP SIGNATURE----- Version: Mailvelope v3.2.0 Comment: https://www.mailvelope.com wsFcBAEBCAAGBQJdGkVYAAoJEPj8tTZUBxQI7TEQANP8/GhdQZDE20P7E9Xc vAbfdVwUQcey/DeHBtZOLvz+tKwFnh9frl91QdEbdkjN1ZT4s4+QCjR2ulBL fiHA/c+FX1QoeJikWZfqWM1sKeWbK+FkGOl1/d8n/fJaLqnly+h73KWjXGex V/+yg+IpY1DCswdstrMPG0bfMn5azUoHfnuTBmIzqvIiYp+6bFYvBaVz+k6M UrkmAloPwu1jOyW9SCxmXrXzW6ZHZQhvAO7mzUmHuh9vzUBWFuubSYeLA/1k TXmrfIuykOwTZtlmPCsdDUU64w1FXZ7i0YoCMxmvkwEq6VaHgAxGQuC6h3wT QgTmLZmW4/lQBWg6EZtUhFifDvmk/WTqZxfX5714skDUyw/WTgmhwnUvuKtO 01B+z++t23uC3hCWVhOzpXHYgvweO+BLcLVhir/UWvftszy0l/u8vdHKo8eB ur2cTxp0TbazAlXnlJGIKR1sMoLhNkTJHC6YF+GTna4GeQlRgech7WtfHNLo lPW9BlONHnrUpCP/cm2Ny4gCmRAcF1XN249KnZx61o+WmL4G1msT7PRyQExw FKDXiS84w844jRhETAzR4PdvKK6SxeL3tX4+/nQEVzMibmKX9wdW8HGpOfEt PXCeTMXpFNtAj3jOmXNGlt8DIFYlt01U84fX6jMfofjEOO0qEL5Qp3NnTv0c DSrP =ez9v -----END PGP SIGNATURE-----
-----BEGIN PGP MESSAGE----- Version: Mailvelope v3.1.0 Comment: https://www.mailvelope.com
wcBMA3C2opSCLRqEAQf8DV61zBHwgqVoOvDePrWr23bHaZtGe6QLk2E75KKl 5gTogs/WPFU2VxMWxjbqo2yCBr34uYoOsHdSsOtA8OUa9Kdaxsho06wetl3w Civc+c6Ihsi2IGGR8p3/FXt+0cRZ9RVXLvMrXg0IKTF6t+ez9finWz8MvRxi LiyWoOs8IcmXn4Fqz9hMNINhqh8MTlTz0iZE/9t5cPjYHR/UYAEthi7ROMg3 KPDwWzNByi1/DCR9SZsbIgxv7WeKdJ9rMKUynK5+ZF173xJnWwetvDrXbtJE uLR//YKpMr0AFEYlzIL4sOK9cn7o/esY1Q03enzmeHJNkFk94JDv61loFD0I GsHATAPVRWQINAzMKQEH/ijVrJOQM4+Of0zTt/b0gsUApeRlDIanWI3wH1f4 knbERpwjRsB57h1Y0rZmcoGcrylK9qYJ0mvpT589iGRzsACQOCc33wRic1ae DIMb9/Y2zMD8RyKSZiV/EiH514GFat4T2dUnsgUGaKnRAJ+AuAe7DCN/21sQ bLJ6s4XUk8QIDIahUixeBbkafhFBOHX8umnx2vy/fl0SYOpyxlX+fWr1iSr9 DwTwXUcRw71XGon/6X6awFHExVjyG2ciIZne0QEFohRLCekzQOKoATb42z8Y 2Vzg+caLIXJ+GiZbowwTP/yx1cRvmCXOeZrI71jvQklWpJX6ClZZ1T8uPQAd i3bSugEXzC4GetZxOWGyaRBsSysbsQor8T1dcOmi1V+UTkqrnfN7WnTau305 haJfi2UpK4EBH48bnez06QhiqBnxvqF41aS4ZtEkh/nyaPrf00Jml2YDGyYU LRY5l/BPCFq4c/q0ZYdpQotCTg6LKXcgT6DZzuMTL4TRbBc7w/h8nuQdqL16 yaPl/K/gm1KF7lLt0dC/lw4OfKVFCwdq1bizMl0qV9nxroq4a5fn5xjFLami PBd9XyzDqIU4Hg== =XY7h -----END PGP MESSAGE-----
-----BEGIN PGP MESSAGE----- Version: Mailvelope v3.1.0 Comment: https://www.mailvelope.com
wcFMA83LcV0SjPxVAQ//ZmMfOMa/DQyMAV0wM9EeUSEdQG6DOx2+UL1AYBY+ b75RWYpnP78GlxBkBeqWl6Pf2lW0S37CaJOlKdDnOLCWaDTKjyvvggTuZcOm 8QZ0GI1Y0ZLZmPUohR+VCF6M7UZm5A/Tc79QAto4uzhpIbtzxXIcUsEs5HLg E429YDYQYTbr9mr/UcyuK/EMTFSLJupwmHK40Dngbjqg3F2DdswCw6TkK30e XxdlL3iQ0vENCTQMjHrDWWA2+hdLnsjGgpwBo2jaHZuYNkDHt3FhNK7jyI+4 +w9zeU7OkbY4OY91lLQcUKTr0CigdqVMJRbFYt7D1OowDH/NKdAGZZJelsvu 6JbdAcC8pA4Gpz8Vuwp9d7PZIUUgWui2JYpPCy68ftEv4GYq+BXO6jdH7S/S YdBmNP312QDdWyCR2I5mQrwlEyv1LqFID8/hMx6grE+YsMKll3bUv88LMLGx DfDgnpNHlpMJsx3ye8YnwE0XlSjCMV9HhxAhcr1h0z0ZTWASiSWugtaqS7Ax FVdl0lErzz5Cj1IGNvPEOIMCkS3yWSU6YSA8RjZopa7bpoHktJ7RqJe5IC9v j/+zodlwbGObIPUfchQlVGMxpErXAQNjPBL76JtR3R51UkcfaHJVRhMfllTt 4RVAzsw1TUXmXHHMri6TfagAXmZBMrQuszcWSFW5FtPBwUwDJV2rluoUwV4B D/9e/YRaELCZZCkrZqrP/ywym0+PBjNiNwKYMFN1Teay7fmmcWwrRNj84dIL H8zX3cRVz8vim6UOM8DHyqh7nCNkVS561XAFz0jPBYumcKnCZ44RrLgdAm8L hTte8bXjLZc24LQmF/JmCxn6FCEFckDxd8yKV8JXmIqXfoem9NY+BgqcGHK3 PB84buCIXu+oBDmere+ZGoWLQrp5w017SIVcsaKXMuX5Xd9iaEHH+xth8m+3 MbjnH7OwZSjy+w4bw7+yQzKwV40yKriEH36uT2hq3g0buw5VOnKlQYoGQ0zE CYkQiIxwz4L1m/kRC5aE0kdNLG2EC+GUg7w0VrNEIP2CO2Iwd73hNWmAUv7y KxzwzWxplMbeu6EvfVxC1RYV8UcuCJV1EcROLivqgIjyk4zHlniZhN6vvoF1 wzVBjjda2FZ2kGXscx4LA1kmifFW42oGo3cVSd+mZEMEEXvluCEIpn160QCs wlXQXvMfNOPHuZ3JTw/Sb7+mZc5nIJAzhhKW5MQANP5YiLDkx4ULpghE+CM6 6FopL26UBOa47tmvPv+tdJSNh+SZfTJIG5z2jAdxIKBJW+WGgmPgzbSWCLHu 7MlIMAzq9zHVxPywZ1iy4SGXyynM/OEtV6Y7Kr4hsskdgo6V6vOla7s/5OU6 u2KawJ2l4mdCez3CyN2kNE0hUdK6AUiVdW+cDT/dLzyP7PUc4omGgG8aTCMD G4YBh3Cn0XuvK9r9s6USyaBA/w43eTLjUAM/aF/lsOTATGR/GB0ItJnHnRp0 wWvqGC/NG41gm1yF6e2mHofGWrqt4BEc3rELeYQvqByZENi3Uawnta2RiIqX 0wdcdDZKa7MJtU+jATuuxSHJVpgIS150KzmfOyrv2I4OYbqw4UUwu9F/TzF7 hVldo2CIM8zssVg4pOz6QDNE7ryGFL18wA3R =rJC4 -----END PGP MESSAGE-----
I am not familiar with Protonmail but end-to-end mail encryption is already possible in a browser via PGP (https://www.mailvelope.com/en/). A desktop app wouldn't be that different when it comes to security. Especially if it's based on Electron.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v3.0.2 Comment: https://www.mailvelope.com
wcFMA4GQ3EvQG2nCARAAn8aXQsMWgn7H0YqSQ1y/DXmi2hJI1FDii87UpMF6 e5ZhOzYeM7GeE/Hhn74pCpcbuia99V6ixvpL7L4vPlBmBrXhjPHzjbGH3VsJ Psv42q7t+082LbVwVNzhKFa52vCdcsOLzIoPppXy5e2zaUF4vfqmpsQZycn3 O7wUb9XTQcZwsSwyMfSZO2Y5gk3VN/QWq0Ih+ygSIjvVEr22b0yl6S+KBLJb KPEmlPl08u+Eg1SVxGCc19LZr5jPODraKH35Z2iaP+701/OuLuF6EXbOZgbS 10cWUloarMjfFB1U67GXVtOTnRBsurVgh6M8PWqJLKnFzzGBzLtRKk3Wf7no 4KazpADfg3RWvFNJi0zwV5aURo7MRh8Nvk3JRVpmxEI8MCrSn8G+UL3PKjy3 hv/xjbMKSRk4AhpCPnPVBRlk04h76/XDHZTr85cpHa+OFktqqFfv+d6GSxE5 WiQ541XU+9rfwSXLTs1RqF4AtABxQLTeL27it5qHdNeoLQ8uKU1fmCRL/oSL /FE7HxN6jG1faM+sPU/lGmoYcUSFbbMDI544cVHlFY35ImsO4LWHUoGrRstL CvbLE7OfjxtGcwS0cvGO9is9U6GFY3x0hMr4r1Y9JAjRtr+XCjZk+cMC4AnT c8koUPKCSAisz3lD2wnsZzfHdxxGl7/dhUlabE/zBXvBwUwDzeOPLUMopNsB D/44XFLygFIijWdZR0bSRmsltZG6AtAMVCN48eQ9BJHKtu1Zr0h3ZWQSS3N7 +PXAQ2GcwcO7adlEDuXUcfvHeGTGlJQYvp4HuBq9JMPXr3HnO7PzVniVpzRl Exms9v+nRLfhGVyPM4O6n/HCWijoaj7t3Kjv7epYZTd0rCsUG8JihH3EpgCb EbCgGIc/d7Hq5TwNiWeGeCtPcIskRuOhSffxqJg+2HKYaphYRo+vcrO4ZmQX R0eOWndhVNUq35ecIEKOfu04hQQqVLLDKfwhvTYfy0t0fGK6mElFOzSy6HSS FCDLZUikSQTfc+o4nxRUKJm/5YHekib9fgfidZtCHEWzPIcaqs1nH+AUlOjm IMDPK/oVPTFA//3FiXvSI+Yq2/bpKfJKpIwUKuQDZ0jXHYqdBROHKMDjyY7O ohdokOTsTInWyrOdmIVE8CayhZsBhaHpxb3HeU4MihVG9tbkkaZ6BBD/Zms+ YZrYvWZHZmViZKEbwWIBJVWvzLnQJ/Mui4Mb7qRA390eEx2dDSV9qIQWEisW K2rsv9INhmPht2ZTQ2QHxTJmt+8FPN1X/vA2544ld08F9TvpOR7WHIAO0K8V nLpr/y5n1GLU5N0+H+1n/0lMw8CkeI/BBoPNlJekMLVqKO77eXwnh0PEE+Cc b9BlakgbzBe2haBGJX9NURhZetKjAQ5Ip34VPHEEfVjvvM7SxXiEq4DnVgYH GPAVQKqIJiMylX6RHZI7wBpQTeArT+HLqTiK8swXVNVOfX6KLGUAqN4wIDUF GVdzrfOUbpxfQ/FvOeXZiEe3jSoBM+kcnbu85dZUvI1lDgd6FE1VQ9U62A4A GEG+DJw5/qtli7g6EWMMRxibypO1uh9qd0LJFKFMY5fa2MQ1EQQMTMedPypv zmn9Dg== =P0Rl -----END PGP MESSAGE-----
You can add extra security (and privacy) if you encrypt emails. Just upload your public key to Kraken. I use https://www.mailvelope.com/ it's very easy and convenient. Don't forget to backup your private key.
I believe Mailvelope is the software I usually recommend for Windows users. You'll probably have no trouble getting it working. We could also go over something not browser-based like Kleopatra.
On Linux, GnuPG is the goto software. On a Debian based distro all you need to do to get it is type apt-get install gpg. That is, if it isn't already installed.
Personally, I would disagree. Many secure email providers have the option for the user to store their keys. It is much easier for a phishing attack to take place via the web than locally. This is why many users use Thunderbird with PGP. You can't edit the code after they have downloaded it without explicit consent. With Tutanota how can we tell if you aren't targeting users and sending false code? How can we tell that that our ISP hasn't created some sort of phishing site?
>If we allowed you to download and store it locally, you yourself would have to make sure to encrypt it locally to store it securely. That's too complicated for most people.
Many users are capable of encrypting Passwords. How do you think they encrypt their logins? It creates the exact same issue. However this does make the passwords easier to remember.
Is it possible to use Mailvelope , EnigMail & GnuPG, or some other encryption tool on top of Tutanota's encryption? Would this make it more secure?
-----BEGIN PGP MESSAGE----- Version: Mailvelope v2.2.2 Comment: https://www.mailvelope.com
wcFMA9yb7wXvmLqbARAAlce/5iZOFJhCO5j1ZnaZHg3mUjCAy9J490/yAD7B Kw14GqCxQeDqa5uRAU+VGhFRmAqe0FJPoggwWNEC9WZXbPM4ephwez/VyBgP oWMfYu1iNwFpG0saO6f2pKg9bm/qqjKmuPQ2TFs3ey2ajMlAryPohh9dO9PS p/hfIeKOktsEcoWUvMYw7yhW17Z3D4b2TSD3JuPmPncvhp3Bcz0kWg5Y0fz7 ZX9EJnHpnmbF1cgR3QzszbemA6OkuOvles8Vzf8I0x3ycEYDni/lvix7iHWD G9/CtfkM6muivzuRvcvTN9rZtjl9t2tPCDRgQu3zJ995hwWUvZS2n26LW11T QtB3WT171OgBkPFpq9Q4Tdu0XbifGOPDETRWbbg5fn9G+q9GstiVnVC4VX7Y SFXe3QdrGbVf2/CK8VyARO/iuGWPoSK5u2oQuDmaf5abpolUj264qe3tTo09 1lKnsJONPWfiIaiz1d7FJU1+94M9F5osgDjx8TG46Q3rP3jQIJyYf+MOkcpB WWJRX8svfuiDMGsxuVprm9Qc32amcHrqkDDBK7ItVy00u/6tGRO1IR89Nk1C /vTX98M9PUCa4KhR4pSzU5GhRtr4H24Izq4AeVHuheFqKRDco4SQ5OXW/a6C kVcEtvCyxl/4PGwix6o3BG8IiTvJkDjB3WnhLN2NrtfBwMwDbYllwRyF0ekB DADFkpwy6m0ORum4mwZ/kej/SNBUSWbjr4mM9XufUmD3QxeED+j93prtHH5b Li2777V8lsh1eLgnmB6cDYgQZkFOGc9O9bIGgw/K/4RHaJqUO2923AZRJhbd OcFo+yMRcNV+CZZwIxHdqHlI8gtsgLEO7r3pSNRIS80D7PGkW4nDWV35Whee Xq0Ez7e/JycGWONK7vUOdIR/oUPWSP0yLmMkAPCFJuehAFMW5n1BLaDuwzND LC/xP6n4cJrzkdWWxiXl/GPGzpqQ5dQPhlwi4qaF2tbEeWCdXPOUqphWp9Uo eHK0rUQNWDU9pncAEA7NTTrkiKmT5mS7QldHV6oPEEohfBJxzi0F9/SQAX2C Am9j3kFxCL9vUilqCKK+dSDMxJfofWH1v3XCvGXX5A1qdCEKyQgXRf1mbunr PglmdPAl/n1NhnpSiGeabGCr2uMiyYdoESMpxtX0tHXWXeX3f2aSGKgzNmMu Rgn9kJAiwyfGH8NM6Y2aRcz6MEoxkDFDlePShQGoJR8+zHItPJulCjmxNxKV 0JY9DAqAoC9BJSY7xTCMxFjHYMU4XkIM9aTWHYN4dxtLDyWZ/TYt2lw3WqLA nqeJWQsXo1i8QiuHXrzDiPVJ2iJVrkJGM5NAcdb0B2u90OJpE1TJHDrDn25S j4PyHUgeTO987bDihCNWT91q/Z5Wfcg3Zmw= =NsQZ -----END PGP MESSAGE-----
I successfully send an email from my Gmail account to my Protonmail one, encrypting text of email and an attachment: ProtonMail received the message, marked as "safe" (green lock), with text and attachment unencrypted.
I did it with the help of Mailvelope (using my ProtonMail pubkey to encrypt message and attachment).
Well, it's a matter of who supplies the code. My understanding is that ProtonMail holds the keys, but your password (or a hash of it) unlocks the keys for use. And they supply the code that does that, each time you go to their login page. So it would be easy for them to supply a poisoned login page that grabs your password and sends it to them.
So a solution would be for you, the user, to hold the keys, and use encryption code from someone other than ProtonMail, running in your computer. So ProtonMail never sees keys etc, just encrypted messages. But as I said, they would no longer be able to do spam-filtering or Inbox-searching.
I think products such as https://www.mailvelope.com/ operate this way. But we need to have a standard, and have masses of people use it. We need the big email providers (GMail, Yahoo Mail, Hotmail, etc) to adopt it and make it super-easy and fully interoperable.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.7.2 Comment: https://www.mailvelope.com
wcFMAyaFGd3io8NMAQ//SJSaL4wlTLthLqm0RfouDtVMpMxtIZSSwcguSx7+ BA2QK4zo2kHCmFvB5T1H+qBIUh5x9iQGX6qL0eHnPZCCxHEXMnt6C6APGkBi QPmySaEqUh7nxey+6lwZgscpiKWrMUzTmgCxLOd2Rl4TR/qXRzI+jCzhilw0 227VAK3bw/ryLch+NmFnYfWozSnGBCb8KQzx/fxp6Wx+cylFLlHdul6mrsn6 Gbemo2HP0Wy8dtUuxeaDT02OKCJU6KrUISXfkvDJiF6WCJfS2aqKyAN1MbX6 7Jpvaa1B9EpB2Wt9it5xgxjFCN7QvZk8PW1/avTBVPJJuoamdHbNRHNSniSX Gz5FM/A72zOwmnAGdQYtVnMUhdqdxs28rSA/nzIhGheOVsmALEM8KCtNSfMf 4nbIapCk3TCuL3nTe7ZEzba58yS+G16vxb9QVzhTcDn1HMB9envjaxFhV/0b cRCBAwL1QwEkZ1Jj3U1KW2oDW5b63B/ybrGKCHIAv+yxV4AGc08nsM0QKx88 mLOTaZUEh5no8EP3O9ELS4DHPMTnU2Fm15UwS/nDCYckYmPBPFIe0u77ccyS KZjDyi7cyPNsGAG65tDsOsr0J8TkJkUCQofDwcWMnyY6Z8A9IY5G7qU1/9QR YEyG3FmJOGKlGwolMSenCtJxB3KjwCeY02q2B7Ze34TBwUwDZcBusszQzlgB D/wInxwg8gAhfaPn4MOd/GpmY2aCaczOXAIttTSHANU5kgseOSrKG+FH2fvr f9/95BoUb8eXQSIAg87IH4ls9IyQOJqW9AOaOBWK8wvhzZIEHqzJGM7JpqVA yr9uk9ICvI1PSkmo85ncx3TkgHwiZ9Ls0uoAyzgEr1f3FALlNR2SIVwXCyqa wzkukFmRHnPLbEpT5WwJfgCjIleThiMZinqDDUBW3s8SjL04/0aZstaCazpk 1OeyBLqt1focv3M+RadNL9Kap8iJSLbGYwuIV0dh06U+tTJuY0ZRAwvzviTh XI6EOdI/V2r87xbCLfk65t/3Wpp/slVN+n5OM/cfn5fwYFAXhORhJQSmsgWV 588NQHDG3pWHyY6wQ4alv5oLIniI/sHMey7mypzHH3A3RMB1K/Z8Oqgqk3yq y8SZXMSD0XcUF0g+QBGVJwhHFQmJ/drpb1k6OLJbjHU4juxn66vuY2TULWtc wWRDzv6krudrmchdjdi7I4rsOJSCsGDrQrea8FrMpME78ysCvOQbcUDM2Mq0 X+/hon0IHRViD3iRX4L/RoBEivJBpVnydDeCb+Qpw4eqsGGCW7l/60hyny8S f89zeBrpZT5b0keRyUT7S1zbv6EvPmqkQJPc114opfvMdfReuUb1gbNz60q4 Px5P9akoWBrn5E4flLBVxy8Tk9KKAaWj4WaIXGyqE7pVvYdCntRSKA+LqNf6 4baQ9T3IUEiNxaVh841ocBDh4QSoYl31aRh0g1+H2pnSOAJt9N1nPZ0r+GG2 3D1TuofXqFpONOh1Vqns9YaAuxaCgYt1VByFLTJlnInoOkg3tVD5URBcE2hU 23xFmjOJOeBaMpu7Q0zbk8AhQq2Pbi7P =MC1o -----END PGP MESSAGE-----
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.7.2 Comment: https://www.mailvelope.com
wcBMA2sFW6qzKTFfAQf/SMybdimtp3A1Y0oWWq6+E+4VflIWDRDz/p+9fC3M loVKVH5XsKiogWa4jQn9pnbvrLEwTiQA7T5ocT8b+ympKxMF9GR/bagMHUfy I1kdHXNYDd2Xy6jUEVhHwRoLpkTd/vRWVBvSZPJOiL4wPCbGfG2nIf7gk4LH AMhUih3QulrXgGpNngGuxlT3zdIV3Dtho1q4Fs/ghm9d4c68Kb7wkiWF+f2u z54LMygH4Yu9rvZyzGDLRALzPPm5jVfGYth/LDHW/pkyXwhybpR3MCoL6p+g /fiE3MRFy4Aci3+b6j732kgjYJci3gZke1cm07Eeckr+YKUYKVdh7TZMYH95 gcHBTAMmhRnd4qPDTAEP/0PTz4zUEnYUyALPUIISdVkW6W8zkDNyVbC+1Dmv A513lYdje7muR8PfoxUcq23F8cmP+Lw4+0y96DvNRclfoyp7GTmogDm4Ggxc JCovUCuhSBb/lHYNl1IjjNJHu48JPHLkdxqe909JFIDvVUsMEGrTUsHEVhZK CcBA52fgF8kwuKf+6G0u/T8xy6Dcxvw6iN3cEgqhjl081nSOjD2ahEwt1nGd 1UkuRe6diU64W/Jp6pavEIw4rOB2zCIpyNdqlBY9ozy6ayg0FqjjgFRMOSvF Lpis3Cgw6Nk6sD5vefI/EJlvcTNT/rjLq0sZbFFoA4vQ6+shtUs2ybYq/R8Q +wByxw8KRDn+woxRy+8UtIDPWX+RJU65KoB5a+9Yqf8UAbJ6w6k8NG5sG2gP X2PQQtS/dyZgZu7wndnj2owI2n12n2QS9PyBB8u5klR8QiYNuqq3hmLCvt4z vSY6VLR9zWjDAQ08OSxrrRmfATGh3kTwntwmoLZmdcRs1sew15/4Ud6X9Gmn /v1XAlFYtO/POZA227yQDKxY6i1WOexcl/jeXv0cLBNOW8QOPz+YsmJ4+hOh TUEPU9P7Uj0N/0Z+O9qWxcSYlMO44WUkP8+V58DPOeGPnD5m2bWP+ZeJulbG Zu2k9MFrzqiPnvxrWLlMGde5eScq7BKHgc6nOuuuTK/w0sDBAXGqNxv3NJkH 0MALrrLNkx6OXBh50i674ehwEl9mNV0VS4frR29c8rFyWUIz6YR06dp+0LCj ErJ3DMjrIQ8dFVSLZMoF8EqHUGB421OUzLPPyrippdRakLnix9CN13exffBG hNMtBb5liDediYUM9qFhr00fKvOng7KQNn8oTa/1/Oe2SjcGHxUUTWlZLmyl y+kwcR/GN3qWaT8AGsQII1a6kn4mKM9TLWO4DiKA3VaRlraH95xB8UiJb6Ix SywS7DZS+/YBqLGIYJl0FpOiaVGthwRuoqm3YIoh1WJaMKBrdjw42VXQ9EVD JmX6ZV4dT3ZTYHLiH7mOHaKmKpkAMEYpYeTUzNCxoQhN5OX/AxEqKSo87f9b PRrVQYdnnGeGL2PxbeZh+WCr/5TiK3aAQkw4tq7QPReiDLme3HohD8dQdgRj 5e1PVcPXSc1fpaOD5kyjJ48lBtiiF4G1AW46KQgP8xIJJ2ShOKg9A1C14+Ll uW3B4qhdh54KiE2UerczFg== =kcDb -----END PGP MESSAGE-----
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.7.2 Comment: https://www.mailvelope.com
wcFMA2xzFXiVhw/cAQ/8CZqb4swmKplxy4ULc4YsBlJvyJx0GX1jVlEBtHGk AsPti036v5YSuBUf/7OW1RcoXG2rMYYMUW4QEqgoSyoMkuQJOPXU2ko+Mhox XxEsCmcrFp9Q5Exu1dD26486Ty6ONDsbR2aogt6R4E9/18cp+sq25o9/cbXC jYImViJyEvqe7Lz9g0V4jMLb1OevIOn07M4Ih4iAZA3Jbyp75mOMghXkPHCy QjoQ2oPDYim0sClwqB19FyyAS2MLnBCwmnmbfC3owg4SfOXhNcVl09l60o3A Fssou05mAqWu9qSc4i8SxGhk7fyglY81vTK/0/rWk7zQbYlRoEuLbkre5BQK 9AxDkj5y+FCsLVojlt9RY6K4lxJk//lB0pS8XWgpFuQ9Nw3hUv6RhLMaHA0B AA/LK1vMO2WO6iSXCedravhlnuDFxQOthJWeuIiaAh7UADkeRetYtPaUykzS BY2JfRmJPrPXH3ajOgStOhgdiBCR4eG25VN0Od2up3Tx2mItdU3GlfHvTxGr NmoEADFOSKTfeQC/+nEHpnbyx43PcGGLSd5eWItbUKMJ/Vjbc1betL5BTey2 6EvLusGjl8i0wANjuS5Hgtp2kMsKzjWrOlXuKoALqJHuYXiSYJMNAQngTPby WL1yD2X3sqyQaLrkYnp8sOfELDUhmvmzCnUBCRSrnSXBwUwDMZyvE8G9+T8B EACMFclcSomD7j+4h+U4OXRXdGj2ZhIksOY+KANDMyzlMAFQh9w7IvtYNCOr B0makq10wmHriTThHEyeG1yhjLHMAx1PvBl0lSQ22qgm3jAjtibY22T+JgtH 4VGOUNuZTep8KErvmxUFgtwhiHBsAt0yIWpFCJDMsmUrd98s1Oz2VP4Gwe+O 2PyW7tDHXqKm/VJxulWj9fRMedu4kxwkzlsaoyS+3ESQycUum7w5LNw7CwvW m45Nk3DzXFlefOTrVRpC+QdD/rdX+OljrBN4gQ4J3LB1AVNrQovhI5Cp37za JD062cOBO0TNvHNKsgjrDspXjhvxj9rKeNKi6NLKOfOdnFsdP61uHCQpXFPJ bscFHYV0RIHufbG1DblhbAhA2+D8u6gmHE2NegAKiGmMc0ThoVYIMJoEocNv Qn1qT1w7JvL0KXDFq4fPsDox5ac1jT0A/M0JT9TTgN0rBoWWbZYdJHQb4CTq 1OLNjP/GWs8vo3LIirapgsDrvx3WJCxxoMqw/FUsizJksdKT7nvo/Bw9eOfS U54yHo8kxFTEbKPhKUNrxYx+vq6ikykvMYDb5SpNbQk7r9GpEqYtIyrmC8kh AqXRMpzygRg6HtZqX0fZIuNXlzaOM9CP/+XhHKzAbib+IDuPsktUqXSh0gIt OcKwJRs4/jaN1W/9708M4Zro7NLANwEliAtM9QoQ5ugpGv0L3tn/MBQ0AGGn rjOZOne7vl+xCAaQQaRkMFv03cBBLOzRPyA0drHYmWfMUyxKap/4XV6rBrsH PbIj+vZtPRPqjqqJHrwhSCwi5ouW7metEM/km87vsfDtAgIvihe1y0720aV7 9VwjKjeuo7/J37LGgd0uF6f8S0DcbTJR8N2B8FSJ2LV2BNMXxS2c2aVtOjBm /2azO1aC1mGz6Kgi69nm96dBfMiyaZe39QFD5yV1beOPn4I2Yk4kr+KZcTrW yi8sa+t53ba4juJsu2h/cycZn/DIqbpJSKGDzsUX4xuYpAmDOnOnE+sNWcU= =iViv -----END PGP MESSAGE-----
Keys are generated as a matched pair, a public portion and a private portion. You give out the public portion, and then you keep then private portion for yourself.
Unfortunately, (or fortunately), there's no way to recreate a private key knowing only the public key. That's one of the strong points of encryption, noone can reinvent your private key. So it's really important you keep your private key in a safe and private place.
If you didn't save a copy of your private key, it will likely be lost forever. Your best bet is to make a new matched pair, and then keep your private key somewhere very safe. Then, you'll need to send your new public key back out to your friends.
When you get the encrypted message from your friend, you'll need a PGP tool to decrypt it with your private key. One popular tool is Mailvelope (which works really well in Firefox or Chrome) Mailvelope
When you open the email in a web-based program (like your webmail), Mailvelope will recognise the encrypted content. It will pop up an icon that allows you to click and decrypt the message with your private key. It's really important to make sure your private key stays on your computer (that is, the decryption happens locally) so that it can't be intercepted.
Hope this helps!
Countermail can do that, here's a review by hacker10. To quote him:
>In Countermail settings you can import and export encryption keys, when you email someone Countermail will automatically encrypt the message with the key found in your keyring and if none is found you will be notified...
I don't know (https://www.mailvelope.com) add-on can do the auto, though hacker10 notes in his review on Posteo:
>To use PGP you need to install MailVelope addon browser, after that a new button that says "Compose&Encrypt" magically appears in the webmail interface.
>You can add your public encryption key to Posteo keyserver and activate "encrypt all incoming email", this means that all messages you receive will be automatically encrypted with your own PGP key at the door, on top of the encrypted inbox.
Another comment by hacker10:
>Posteo vs Countermail:
>They both can use PGP email but Countermail does not need any plugin, in that sense is better. But Countermail is far more expensive than Posteo and I don’t like their email interface, I find Posteo easier to use. On the positive side Countermail has the unique diskless servers, it should make tampering with the email server far more difficult.
>Privacy policy is about the same, both services don’t keep any identifiable information and both companies are based in the European Union. I chose Posteo based on pricing and an email interface that I find more user friendly.
[It's in the comments in his review on Posteo.]
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Test -----BEGIN PGP SIGNATURE----- Version: Mailvelope v1.5.2 Comment: https://www.mailvelope.com
wsFcBAEBCAAQBQJYP20yCRDHDfYXSg5PXAAA/48QAIu+6euNHapBgtkuRAtX tmDzXlvRZ4GViKJx86mL9XsV5ksdxOewui6z9i8Ra1wVwoeBoHOu67HEa72z D6SeljSbZRP8TW0awdOxyXRJ/SzpR9B8n3SnPexcHU38xkZKN07ax/ggi96P 1EgIeMQyRDDhIF58z5dWVeD3JOX0iQdhv455MZjn1AIK6aGXpcR2zDzC1yak k/bUiUR96JbH/ntACciWaUO9IFnqH+GL6s2S2tHpYPNDiwrw8ysicPrF4jxj nMbMxWEQ6X2gtFraUiWMnvJdFQHhYsteqvRzqsQ5uR8kfWSXaOUqjNC9Tbwc 0CLjLkOMdjm0QTgfRs0mrmI5KwjtdawFpfjb6dsw1gnf8iS3WpP7TKSS5IMg zkv0fMRLND2RTxnXE88CgQPX4VLyCyVt1ktVihCxA0S31tmbDEEyzd5xVTWP 1c6z8X9V6GdqKzljbsffFV+rbzgfmdobYjFjSa1FbnaYRFMYBIYz0mf1RI9h 6pyeJA8nd3Kn/Me+20IBsZs0/OogxbjoBBSVKHKKQcFXSaE3NPAbf1O9DZ/r ct96D6yDSQx99IZ8Oxbp/5oiVApAroIWHBn+GCn+Ae0r6+vua0zUmVcHjl35 gOAPvs+FIQ6GMm6+sMAbwLfz0uGxedbkf44UEDmu4wZCZh8/mt351EQQTROW lq9/ =jmMr -----END PGP SIGNATURE-----
> They aren't going to start checking it just because they're now using PGP.
No, but the extension can check for them, just like mail clients check. You have to configure a mail client by telling it what your mail host is, the same idea would work for an extension.
> Right, but now the extension is tied to the webmail provider. Google releases their PGP extension, Yahoo theirs, and they only check their own providers certs.
I see no reason why you couldn't use a general extension for more than one. There are more than a few already out there that are independent. https://www.mailvelope.com/ is the first one I found via a search, so it's not exactly hard to find. The best argument I see here is "no big name brand has made something that a user could trust", which seems a poor excuse in the world of security and privacy.
> I assume mail clients check certificates every single time they connect. Is that an incorrect assumption?
As above, the same way a mail client can check certificates (you told it what host to connect to for email) would work for a web browser.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.5.2 Comment: https://www.mailvelope.com
wcBMA2e1F9zJKzA2AQf9HYjcS3bFPjVsnI4I/QMf9kFgghrO97591MLLbKAb xLTaxMFjSuI3hX39cKBsfi3HFS4BjaNDW6VBMkmRlUP5sa/EquCwkawWvJof 8cgIK3HYV80BHzkNKz9tEtMB6O6tc05kaqn8tIfogguH9+vNQC/gXVIRViCZ vNH0zOhYG5zxef9wbz87qbpUJ7ePXes3BeruLLGFs52Y5NxIOovxnEj5yRmC kkem33oD+UqWi6l/8u3zU2dGYrMU9WDpJTmgEonV8MkVyLQXVOOkyGY7HVhX ruw5KnN2KNN+pmB8fWnw7Y9wDtPekqlzOBhgodZtu99s0yMzeB74e4A8c9c9 /sHBTANkEUb5fhnfgAEP+wVr6AyYohNYZE3kPTRWoru8Yj4+Z5sIy20r8Tdc ePvqOoAeaEwudlWYE0ZNWtH6ohY1ZxG2Z6Mvm5XQmpF+qau9W1d/f0nGI3Jz wENomlEbs/EoTRJytDMJPOWH9uJA2RJvekvzSUboaBHP0bThTSZwp50Hft1s IB+Cgs/1ViZN9A15m8dIKc8QXoECpQvsIoRoZV3ksGRQT90D2nGK5O/miDuZ MLsvc9vn4ZLbq4m7NmmjBQ6PU8QWwgdDJTQKkZgOWpyX5LHaVY7uOI6IR+1j ZO727uhSoNVjTRbE5pcTeZmaD3V5WIHULe1asRWXTb37/i9ZaeOh1nQvbocd bQvh0wc3tF9U1qdbt075nfVWhdpKyb1tbykPnalmpTRNvCHqnnjdkM0got0r Arh/lYF6jBEZFKmHbJalIWzj3xURmAqTW8FbeOoUDxVscCjwcO9nfksn1bf9 Q3pwkY6Bnbj63SlZBj4T8PDkNBy8oDTzZbSOMw1BvV/qk1YH4s94Bsni9aoY XG0LX8BLi9EYIkBzJKbZSyYK5naxAV0KogtYBzW8yQx6G2ZZNxYyhS9rTigI WV3VGbi9bFbE7FmqUI64gcgoP9INBDeY2W4ydBVmPG+qBLIDwvnlae6U40JJ jVeHGa3erJJVaWbuN4MtU52IFn0kxxdGgcEu+CHNtumo0nsBcJjX7dFDDcHh zik3wJgBqT3wLEs/zVGIAg91ToNfl6Keimi3/+X5zZ/DcrsdGfBwjpg0IQnK zcH2oAGcw58u4BWgxe3bITfXaTRYSmHhDIgP4lD0YfJ6qYNdaqb22JhXogUN 625TPYmRfk9VB0SjQ1klJLWsw5WYk54= =ucyu -----END PGP MESSAGE-----
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.5.1 Comment: https://www.mailvelope.com
wcBMAyWirNl3gtaQAQf/V6UOK2HzQUQ5NefaHtYcL7amGbDdBcUlJwWb2kKr 5KKkh6hQHsb/wVuu9Lhybg5ipHV7vfbQLeQm/l1LZVUu4OouapFYhN4RIUGn AJ504yDzwu9w2AigjQNb91Mqo4PbYT5NvHysHoOfa16O3LbsfBJ8CE9fvOQ4 LGuRaYCcfmnJUw/bHVozHNLXrBCwnUgMRmczckIZySflkAx+PQhjUbTyiwMe wc9gzDv5lRBzZ/Ec6jxlvmiuoBD53lul8NFrBYKbP3eHjUDN8pqjXkdtbwE1 +0Y/HnLKvKEVcLtqw6cWoEjhyr6jArX9CbgOWTazz7dtgLUAWAQChFg9Epv4 /dJ+AR0jmoRbWIGn8Cpn81Fzam1cRmeiwOMGXQ+Vpjm9tNKysZ7CNXopfZoN DXX2UE0m1wu+zC1bzmEGWkXrNN7aIfqtFwHUBBxIJX45wsjGHOZ/+uDr5tAd Su2AlrUDbgvkZI/8RFXDteZBMKXYo484oAfJu9uWandyM2QnFxjf =kk9X -----END PGP MESSAGE-----
https://www.mailvelope.com/en/faq#keys
> The private key in general is locked with a password. That means for all operations that require a private key like decrypting or signing of a message both components are required: the private key and the password. When exporting a private key to an armored text file (the one starting with BEGIN PGP PRIVATE KEY BLOCK) the secret part of the private key is encrypted with the password. This is also the format used to store the private key in the local storage of the browser. So Mailvelope stores and exports the private key in encrypted form.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.4.0 Comment: https://www.mailvelope.com
wcFMA0/K3Rvsz+IzARAA2mw+M2whdW53Af9cI0Cz26c4uuy9IsSRrlptfKe4 DY1ZAp/ODC5v3ikicvourLKG+mzjzUvKksdIP17a4tn03CuzQO9H8oHvuWv1 L3XIOTEH7/37uJjzQuVuL0UJVbxZBP2gR0YwY6tilf5vGBIiaEZMHQUyIf2I 0BTKL7f2nWSsJ8w74Vmzd5AfNscM8A3X53bTN+6qPHGyXDq1fE8Q09V17+5t PLfWbYuN/03ZS4I/vlYFdQEhxygLNJkEzsIr5FHOylntYni25MGBY1wAz9u8 pcEpf+2mFdXVD/9pVG3fNt+Eux56/Lo2uMbndY/Fin33wnYugFSTvRnnJnsQ q9wAzrvdteI+YnIfSbbwgHxXVO0/ZpgnVlmalxcSLQ+E7AkOPMr6zB/ODx+s 9HBLLb+5STTA+wee1I3gtQ9/jtJhw+IPPz5oysTwsA5hbOqeDoFGqUQh0mlK MsEwiLFNErvAjjL36cgZjwAnZeuT8PNscuF3nOXBAEBk3Xgrir6FXAId/HeG qQnjXPGw7mKqDtRwoaK+yNji+NWgbJI/TDcCXr3hjpLMdraLsCqBfEgEgvwr wknrdNZQNycDLF/Yu5FX58vRsqn4IwoSnc1qS6W8or7iFv+sXJWgn4v7T9lk Mxsq6E1S8e3nA+VawVneBxuJPJfcBOfBv3DmzolvHmPSkAEPgH3f1bD8qJqJ UHfNXUQ2srwh9kpWKc2xmYMUSbd3yQFQWHnkaVYgjnvE1/nJD+jPmv9wJhJx /aAc5rsqmoKp9ELns+G25a03rFXyHuxhdkGS+G0fG10bOqbwDPHL0HJHkWtv LHBVFk3cyOBAdngIIx71ShZ8b4e/j5IZCwPmM53Q/JXE+G0S3abfl9mehw== =BB2k -----END PGP MESSAGE-----
In my experience if you're using Chrome you can use https://www.mailvelope.com/ for encryption. It's reasonably straight forward and you can get started reasonably simply with it. The help docs are okay, though obviously lack a deeper understanding of how GPG works and make some large-ish assumptions.
On OSX (as you mentioned in another post) GPGTools for Mail.app works great - probably my favourite tool for managing GPG keys and revocation certs. As for linux, I use sup MUA, which works okay but generally I'd prefer to use Mail.app or Mailvelope.
If you're looking for more detailed workflow for beginners using GPG then that's fair, and the tutorial I linked earlier might be of some help - though if you want something more detailed, I'm sure someone can link it for you.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v1.2.3 Comment: https://www.mailvelope.com
wcFMA6t5ViYuG4UbAQ/+MUxBgdZq9ottLSc4KanGhpqMVr3DUt1n+2156Hgp sJpAMPeF/uulHKJwSap4tHT+Eyfcm3U6d8SO2WIVQQjrhnp0nQSnxfl/860O mQ8bMTihDi84a4uLxI61oEuZTKKuYxxkNQzuPhP7w/DdgER/sILahP6Az7GZ uVMAra69IUfrnKHht2defmGvfxLAWrmJvMf9lhmull2IJxF45TBSlf0P/5qw 8JV6lxjL0o10bxNjmF+WgtqtbEqixZIGTNN6r+XwaYKDBWxNVmhOyheknDdm 68lQShLRW9UnDLSYNMy9KjemskkIUgjI7WhXlpg3LvaVnjqZ4wHfdYYucbgW Z3JSOcM+H+xmqv0y9eGETxq1ii60OCE0J0hJ/xjsXCMs9q4x+j36DJ2L2AOL RLwdfoB/Os7OAXTR1aV9PdOvAZ2ZJINeoyQKrSpb2Pbz5ywuAN6KuUTGJ3vd ifdCUfOgssomTSDAk73doG23BO0azRWGh4Ex2bcBaNzvduK5tkeFXh+/058F PUwGdMoufVJuz+3VE3cjaSjyusLJOf4EnXuV9qcRaFZ+YW1INc68Qu57uhYV N+opIS6dq7nN/NW8m47/qB9jygjqlIXGPLWmtp4H6jjzrhZ+0WKuMbbRxUtB kq4GwvGDoZiOx1y/0Q+yiL5TPoDAmfD1PYx1nRYP9QfSawFyPsA7W+ZkxeaK 4Ub11RaITIs8Bs4ZJlUc3f5KmwH+P4pH5UxApJOcQ2kmpBt1t4jvPbGigig1 pEsBX3ShtuEF9f0z84Mf9oZPw1DX90fwRSYCqTXQh0D/XDB5iVZv+WHfJckg s5EREFgT =J2ni -----END PGP MESSAGE-----
As I see from current situation with protonmail being offline by DDOS for days now, it doesn't matter how secure a company is unless they have googlelike backbone to take the hit and resources to mitigate.
Tutanota can be also taken down as Protonmail. I think tutanota is much weaker in terms of available infrastructure and resources than protonmail and will crumble if DDOSed. (It is hosted on Hetzner (lol), compared to Protonmail's AlpineDC. (Tutanota's IOS app has no pin protect feature. So anyone can launch it and read your emails if they manage grabbing your phone in unlocked moment. Also its not a real app its a fugly html "app" wrap thing and clunky, reminds me of TD bank app)
It looks like neither are reliable for daily use, unless protonmail gets the funds to employ some serious defences.
What about using https://www.mailvelope.com/ meanwhile. Its browser based add-on thing, idk. I installed it but probably will never actually use.
Tem o Mailvelope para Firefox e Chromium/Chrome.
Mas ele só trabalha com PGP inline. Ou seja, as mensagens não podem ter formatação HTML (apenas plaintext) e ele não suporta a criptografia de arquivos anexos.
QuadrigaCX had PGP, but its been broken for a while (encrypting with wrong key).
I though it was Mailvelope, but it works with other sites including Facebook.
-----BEGIN PGP MESSAGE----- Version: Mailvelope v0.13.1 Comment: https://www.mailvelope.com
wcBMA7I0vk4oEcEDAQf/cxL9TT5yKSsO35BMT/BcHm1HknxVbCY/Cos21Oc4 puBljFUFBpi91kpsPJpqWwVBWBkIre9YiWiOOD5dSJlKuxGwUDe+YXAcDfAE XWKBXzpOD2mRygX2YQbjTsEPtT3hJomrknajAu9YhwtNhWJHbg65nLrusTII sF1DP+djo0Uk3r4DrPEdwCVmp5N/aGKB+XK9DvmU0F/oI4CYB/9CIu0+ymt4 +tjKiEl6MxtWzwsVgkC0Y1evV3aow7NwOdRA680UXMov8WvPOn1aFxKRkweZ zOi4crSoJN1ukEsz18qxDTkODqY5Mpx7tbm8iEYwD+dLGoaATDs0MSVgYF3V itJsAZqDWnI1BO856xYpqcChZj4Fh+uBmCIef4Rf2PPTaj71oLmW1OzIeOse 7csCYMd/EGUEx5GSHtnIN5nGowF4d967jMnPWjYbgJZvNOlkunGJxGiBZX+L CYxVvurWiNbqrrZoZYJMOX80BtUf =fz2H -----END PGP MESSAGE-----
It was late. and I left out that what I meant was. I meant, you now have my PGP public key.
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: Mailvelope v0.13.1 Comment: https://www.mailvelope.com
xsBNBFN57j4BCACYxtLe9/rC1Xc4zMCn2ILGzvd2jyRUgWymlnqeddIHWmnt l49O3mlHTiFltxR0skSOWJxeTnB6Li1kfu/mxwPyKIn3nabYRIPQecSbPa/n LNkdcfZzGVxFHL3ULYQycCf9ykbIIxxWjAgp18lgtXaC++zNpcd9tyb/a94T AUYTJxx9ODnAvjBM4yPHN0Mx52J9U8Q0WzRJwAGck0cXWTa2yGP7A46PdGYP Bi0OsmMfl1kBeupHWvWElDhUhSNYOlwx4GzAtCDqQb2FFJt+ZZXEQezPT7A5 G4HJ6nzQurRn9cAD6xSNQlTikk0KXnNA8+QynMBawAzHAjdlj9yrIvVvABEB AAHNH3hzdHVkZW50IDx4c3R1ZGVudEBvdXRsb29rLmNvbT7CwHIEEAEIACYF AlN57k0GCwkIBwMCCRDUD8ifqdS9ZgQVCAIKAxYCAQIbAwIeAQAAw7sH/jjP M4vI4Rry6ZgKnzarNspTVBLN/xmGAgWd+EgIjncQoEesxTcEv50HqXbWNseL ARzgxMTr7hqCnlSE/LFKkjjCQKe4GPRxSjHRK893JDrKT86TSiiyVz2gGQnq 26PRe0LK4TY6xZBDYhZgi2K3lk/cHSgIpMI8xbHhd2+aqwB3A1hyaT5891VE m1vKGQdSVGV2U+rpGVoMRfA6AUtI+ShAVUjw2qB/DEGyiSjuQ7/t4U94PtDm m7GJzovIK2xDSh7y5M7Oa97pj+QDK8U5lxQjEyFhnZ3TzPcylTYplBu8O1XC /gFy4BRq05fIOxYdFdAu8kzSKRK33gouYDC6Gi3OwE0EU3nuTQEH/3AkcnEU rGM9df0Ojhvpl+0nWuAda2Ij28cHzz912KgJiRQiJDJWUOXN26SUQYRIth9X FlVoVUqT15s9VOzOgnyy/zqnbl00hrubuPAZkf+mMl8/U6dUGkSuypim000r 2LHljVY43TcAdRrCUWPAEphCmSHVrsbQUclTv7pN4gV1ftloDmcboJHkcK7I 5iloI64+WxSKV0DxmEmPwolY8AAa3IF2JlBy3pLPRWCJcnaAle3K0W3zj6jO ze1OV30nMYGpAC5OgKv/+F+hCIl8gpOeN2t+YW1GRkuUGr2AOYBLqquQtsQ2 8CApyDkeKkqLMvAUfbI3Ulq8Z4sm7mhR8ZUAEQEAAcLAXwQYAQgAEwUCU3nu VAkQ1A/In6nUvWYCGwwAAJhbB/4/DnYLFG+Fmh2HUWmo84dxQb0R2pr8oLKg icYrDEsSg1pofKQ9FDcvxJjZkfdGx6NnUlMtSz4K48DjZokABvwuiYCHveyi OCX97cxMBjPPuarRmCfLeyerUMSEQ55F1GJBB0HsreB996J6DQXdctZ5Z3LG mbTkaPDJCRyPrEX8Z6SX8RBIXKUbSQQ6RHZTYUaAm14/ACKjO/dxO8m/7aIY z1siR7NBhjunqzA8tA1MWeCqDTz6zSDhf2jO9pfZtwe78zDZHGrud0QP6xWb eM+VmX4PJAR4rITxOh0LywttDhNwepekJnAozc7gDf84ptO0z7p30gaaXLPP +K7smOqK =0/7E -----END PGP PUBLIC KEY BLOCK-----
So Feel free to message me via PGP-encryption using this key. About BlackBank , etc.
Okay, here's another try. I understand the concept, I just failed at using the software the first time
-----BEGIN PGP MESSAGE----- Version: Mailvelope v0.13.1 Comment: https://www.mailvelope.com
wcFMA59Fn2NFSU9rAQ//WVE0amwbBArzWqnNcO1849svPmJbqtXVGEROrvsV Qkurk05DllCA4b75Tuf+GreE+sAkxFYkKGKwuh/44G3aKErVunwd/YCSGvUO Zz+F8GoWiCHUC1a/tw2Emj1W1zyV2/36bQZEqgmGO8VEKwkF9sPdYX96BXTe tINiDJoUhrbqeM7U5LXZ1lG74lgPWg+HUwxx8Z5HSY4DFbQJnW9/4DUIJTTx xhTa+7y43i7/OP08yArGA2cQvbrA5pYrfSEPEMJc6TS+OF93xikKWoSTHLO3 gVAHQnwyZrwDfWhn8NvoGZVo0MXpgAPuSvNHTZRtTsKtEF46PfglsJZNY9Pp rtie1LDNIvZMfXP6hQZhV1OXqUR19y/5IUUI+h6dGN2SP8mlvPAF5uz9v7LR WS12TZWQuXp93/W+nRRAD6Kx3psCjM+zmmXmdKraL/VpIz9bEysDe8bv3Q3P A2QxhlH4O7XZTH5FhPGQE7UhH2sMzZHcB/ZxTGyuvSumxzgXvwu01eVxPn7L F4OccLZ8DYIB2QX5yZazdDaG3Eu9XRQcvCl1NQnkHLWUKtlGIZzZQ69LFhCo hp1FAl+lCoGeZ5hv7WEoLmnyBGzF10iGuN5Xuk1KyTFXlrBGx6L/xoy5pIJJ 57qkaTHJfwkV3hthdIuuGhWiHTdQrPg+LelsFpStJ2LSwEYBwnU9v1Vv9+In IYe7RMESyimC317Uu/L9ne32jY8dkhsAzKxjM4OnaFBGAi+d9Ltis2BtK+OF 9OLdj8g696puw+JQdxXZAG2PSVLMYGnToLNAm4mbINqpcbfoP7Tsy9SHvQEP VPt2p5i2NcaHgC7PfIEwSlSllJOQL8/0wchxpND6890+TU7++AVZWsQ4iJrH uYGriCyrjJPpgW6hTaZvmKhEg/WDOUmkuvn1Q5aiklbI6XYqxA+epG3cFnxb 1eJ9IUk8HtGrLekPg56J4Nen6I3rvcg+eukSgNsV+kCzzcSa00SYhlWOD45C BBlm5ssBY7HDyM3g4gS53luSUcFAaDXcJCFK =yewC -----END PGP MESSAGE-----
No excuses.
For #2 you should try mailvelope https://www.mailvelope.com/ I haven't tried it yet so i don't know how well it works but it is worth a try and you are still in possession of your private keys. The best way to go though is Enigmail+Thunderbird.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
-----BEGIN PGP MESSAGE----- Version: Mailvelope v0.9.0 Comment: Email security by Mailvelope - https://www.mailvelope.com
wcBMA4J+ktmma/zeAQgAlrFnfUUSKQnlA94BCaB9yperyh1b+Pq4OqTBgfF4 Bdcnra/0es654CNQXmwXaRSVCWmxgDctEbuO4nGoBKnS1OYUBaXpv1mjxXnZ CxLciYq7pvsEYmk5rfux0k5G66t/3ICzL0xwb+2V5sa2GGBOQENO3SkeujPt 8snGdQqqr7MQ11wE9cI9UPWZ2U/viqa+9qkSSPqlahnFOq9l4yJr27ezbbcc b/LAqStE0G9RovLz6ufbREUtQtH/UrN8lYnPQNlfsZqgkwxSkEZwPf6Luxvg uq+RlN7CCXSGRxGlzqAWN3ODhdmKzonqG1lqmh1qE7tsbf8biKje9V7IE8VR 7NJlAZ5gdfDbTMDg36R7KA1vTSXIqCtzRCgNsmqNTSqZ0acOIrZ5VnvmUYsU pw3FxPc4GzQ+54haNbzjqkJf2c6HXKhtehqM9xVHretP3/fLBCs52no90d9Z 8ZLIh33waNQ377M3Pho= =iXTW - -----END PGP MESSAGE-----
-----BEGIN PGP SIGNATURE----- Version: OpenPGP.js v0.6.1-dev Comment: http://openpgpjs.org
wsBcBAEBCAAQBQJUJY5/CRCPUg+Q4hrVSQAAvSEH/1be3btrP0y7h+ZW2IDR TkFPgukxZlMAEWNxQp8xkNYoxnx9DZBkzop83+7lgCdnmujUIsG812gsCJ33 57pq/LfCGF0r9yl8heKqqA9sisGKMYLC9GP2yRwd2uQqRnVCaq3DLbJkuIIj MnDcM5qYff+568fJOmHa8FLWPWUuKfy3uN/qWzoIxhDUPSO8wVJFcxdtxW8z zi7/VoRRKEQtMywK/PrdSsIr3rCnwxz2ZXqL3xn37B3IGoFmPH1U9pdoO6u1 aCtwCx5eJ9SZts9FZdKncIJcFBtMo+zQG5H567GvoD3J8cjevy7rvgEFPwpN 1cx8KIhaqiot13QvOX54QZw= =bMVB -----END PGP SIGNATURE-----
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: Mailvelope v0.9.0 Comment: Email security by Mailvelope - https://www.mailvelope.com
xsBNBFPRiM0BCACQax1sKUtGSF9c6eyropDkOj4nbIvmHnNsST8BuvcUn2d4 C+WggrStXBX4U4AGYuGshIERQ8N9TmFKIFJeFXiubIWQW983yuP7F8Gx6K23 QpnDbLO3lLv0M/7TBxx1NEq4xL0qRKHvfZu9CWaOrT0Px8Hs64Bam5fz468D qTICJDXROOqPsu+FbsbgQ9MLsdIHnxC8dmIo6RUHm1zDMJCDqgr2w3ANSHz5 QiKbwGZXC/u37y11F6k54HHY6W+KmpmDNQEOJawiVYbAC373OsUaoXYytzMo I3S0WQ6Ro6aLTWxaQeMnG+srFQVdnpcgI2IHlWP4aypvrYW8n2cTkixVABEB AAHNG251c3IgPG51c3JAb3Blbm1haWxib3gub3JnPsLAcgQQAQgAJgUCU9GI 4QYLCQgHAwIJEGLz9unhbSsvBBUIAgoDFgIBAhsDAh4BAABddwf+ORTG/5n+ UWKdZuy0iax4msTQiGIKWZLorXO12/R0h8o1gT+YplrrkVoTpHIZRiO8ijSu SMcGjVewFJkFrrEz94KlU5Fzv39gBOgYWHwLY0W7MRFNVVRCC3oCLCc+Hqp2 nERMp6++o3R+NW4Ur3axqwHJWxzV2F2VzfgPvpiGbNX0ZW/4CsyhD41jSCxt Ax9pjWsmXXiZfWpc/hwEtOkw3Ocyxa4iTqsWx7FrkJ/xTOZy4Iy9FUn3v/eq 4fPcuBhl1NFelmG3D4gsR+YxgXpBPHlBKf54G4jXj+RY6M8aWd4UZvfVz+ug JaabsmkJS4QFGOcN779t6j7O0r62iWt5Zs7ATQRT0YjiAQf/U8yZzxZUqKEg vPCDG9x3Fus1dEA78tJvCWWAmmgt+++qYKxs/vlTdZECb7acM6VyrlFSlSGB H+H59lJY9wd+PQ2oTwPxBIZgzTJAPzaESUC/+jfpsubIE8mcY9+uH9Z3tIp3 s9b83OWGF90w7CryGVkWGz/cdrn0r5MGXK51DCZZo+UeELUmj7cKp+M1x13s t86z1PvfBHi/fGnVNdtOgzqUBA0nvwJjXdjvMBfvXkrRaNn6JHom+yzmapeZ XKjBm3DEiXv/3n/D0ruYOC0S3Su9UGUfrSvOdY9NsOGExcLctvGaUgXEoVBj EhZfnxhqVL7qOOW8ZpdnXHDWZJS1qwARAQABwsBfBBgBCAATBQJT0Yj+CRBi 8/bp4W0rLwIbDAAAqTUH/jA2+UrtHnlgRBaXbcKO9qFeL3p7Jq75sHHHCfnF sNRmSnAX3oe89EhN2fVw7yNVL3DQg5ILNxNUF+U6y6aQdy+W70UOlJ2aFV4P /ijaulLlr29Bk/i6vDYB67Ld00pZsAcG+IFt0WuWbp7xxrFPc5Ec44ec5tFc JzrPV2trnR90mhoTUZMkqHAwFG6PpVMNJwcbRX6/bYEAaCW8blxiyBkK/GMR UZi721rhwLfpUzUPJHMFh12Qt7emrTEUHtXNpTRc/SROI+eQbDUBoJcLt+gB xWdO9K7dKEh2ir3lwBdDcYa9TcBLDX4Xg0GkW00SOkOoyll4cC8mz8lY/asM us4= =lXwm -----END PGP PUBLIC KEY BLOCK-----
My pub keyy
thanks!
-----BEGIN PGP MESSAGE----- Version: Mailvelope v0.9.0 Comment: Email security by Mailvelope - https://www.mailvelope.com
wcFMA908A2JpOQV0AQ//VVf5dfK0v9R6INF61rTC1tmOmk7HblZ0J8pbMNiy x3c5YrrK5MSUkaUmsWQsPGvMZcdQdgm42BlKrMtNq/UXALhlh+bY/3yVtOzD zliHk4SYo5NAqXUic34qur4+pNYhtdVKixbKs/Wj2obtHbIio07NZND6TArM CdV5G2IO3bkuq3vB1Dr7xvlsnKEq1X/3yh+5/mIT5V+235f1dua23df+bpIJ 1iB+18aKeFfJOE1MLNhYMykyzj8Ktu5zE1S5zVXyo6OVgmG+vcCSLSt0Ys3G FOGSWy7gf9zA/xBqIj59aV1QJIQRBtDb5s6hiUUxcr/ddX+gmRkxBNDqB3LG WOaSZ1qnszcURyqBZNwzHeLFnXJskjvPf8Uk1wEEGfPCR1hHbLz5Msj1S+Hw g9lDPFa1ejDWLNCD5VgkSQ1qCIVFhK3ZyVypBx7Xezjv1GFTZlWuscJwkWD+ Q0ud389TU6d06p4zPle9mG5YRxWw24yxa8SJlQuqEXJaWw0EsHipGzqNAeQW J/ULDOlHQmNeWBBzZM/v3adkz87UgBe/DZ4EAxiulhDUDRw8RIHdIfd+BXmC cEcGWJVsQkqwLByxlDMOl5Y6lr21v1EPT+agI3CMmEXpR8/bLRySFkQ8Knuz v1CmuYzDamc17D8AVySHRVowkgh/PsfkUSK0tp6ycV7BwUwDsyLrPnhPS1IB D/9urT2eozMpVMGkmlC4oa+w1dbx1WVJ4EwF+YWxr+urULz1juu7yhEIzsnz FVk7nAiHKQzQQ3eb/rdsGT4mtAsZWUyOyJR35uygb75+X/kdyWyhyFPLGT2a vIWZ9Zc2Dg4V3ogSGg9/QTiQAFSRmGEVmC0EdrUP3/igmDXuyz7VCH/Xqti7 yPH5U2C9kC0lTauTmirtxcWEzUH/c6t7M12FQH8SyCNzxeICoe4AlK9Lhdb4 sqqiCFUUnZDoVhzCS55SZnIoiNlt0QGrubJf4f+h4H4M4Wmahlab3Ouz62Dc 9ktADK3Q+thaSl05gy+mN3VhjXSmxWtbXWO5DEXP79tFiYB7xRi+iH2bQQK3 v2a/6b+zwh0utxpMAKqw8UPim9MP1yZ9sb6Ey1Wpz7hosMAfrDEZQ6L+v6+r psN/1VRXQK/l+uoTdhLM15rqIatZO22k/rAggZPCZksCVPyVOFp3JJcisMZm 7Vc7Gk6q2BBAQNAllZFrPJfboJSg7jZ3r4dD8bmIUgRJMhm9hZLR60pClXsW fRB0BzuMwXq+rS56kxDYwrF/gym7m3R2fca6gXusvxJatrd3ZeGhPt7ka0zw dARZYTbKdr7ubM6R2vQyRBNRbSRUvyR3u76N8ORgRNgMA0CwdRxW6VW3Ap93 QUNIqN3uFvMZBWK6MEVtkmoqc9JWAQppOonl9HreXYVhda4VSS3LZS7yUoiJ r7iLzzAc6s44EIXjCkXxV1y8TceMikbonQuHnS0njAqPASDu8yhmywHocv7p CpoPqlGzMWBGtbzI7NQ9Bi4= =4eOq -----END PGP MESSAGE-----
thanks!
-----BEGIN PGP MESSAGE----- Version: Mailvelope v0.9.0 Comment: Email security by Mailvelope - https://www.mailvelope.com
wcBMA9Mt0izGiZX9AQgAsehhVO97PqzPJjdMwFPtpEWpQQzbW0iMWtO+EF2H 20bnjhSmIsnQ+yTuwVslhyi+eYpnagZ3+leMoiqfeWRikIk4nu8TkncwE1H4 p9Gv/wLUT1Q0RuYXZJXm1Ss6S9gcZ8mYHiIfJb5gF+BdglFygV9ckP0d+ise QwN+Z6MTWXIlFKMjIePPt3ByXWF3PtIpdTXCDP3RN+geRNg8cgTM5UL/TcAV xHJHF0/Uc3sY8TOc230L5fJsY3S5SzGAbfu8QRw6PSiZ2kkQ/irP+coYZcYT 9QPGR14Rexcfdq6BVfcCWUoaP06vbaZakyffzXp4VVSaVlk5sD4rDEXS0r9P M8HBTAOzIus+eE9LUgEP/1Ii9wD7OIaBqZ+X4hv/RTBMZop05fyukgPnksQg NNLDdqFZauy5e6AoLR/nuR7K5KuwywEev2lbQfSza0imK1BWDMBqRowVbKqm XxwM/RlnOKOu6fecedVtdFU4qgs0g6y1v4H6+iPzDKr4RRq5yamokD8f6ora wzOjH4SKdwYx+POuRBpqhU4I3D1fFw6wpitJ/eB9/vwckJlb6mxJs0zxQRo4 YMjQRs0m+IEsxpwXtbWu6A5xKDyTTzq9kXJzowSZGt/CJRid3vPEkThJ2NOn AwNMbloTK7JGm+qcftm96d/h0a7+/xzqWMus10C2YhwXKbKC/WnEZDzevsHA XaNVsxHmeQCYEDmrDd6nLYOhRo9exf8kd4Lnwp7gY4c5JSFbsGq6Bv1N4yag 1yyDG+9ajg3D0ItdeAqNSBkSCXxek+mRz4yixoF7RUHT2o5bFwQgerSD8h2Y Mc+fP3462ovdOQRI/mAYzMnKsqYx21C5kdYyxFI6MHrL90LBsRLmvn/Up4h9 qzxABugRfwri5xo4iXUyNfZEdjYH5HFsBPUS8ytHCUb2dvwB+n7hOJMeK8fT AEP5S0YvGnJdAbQA46Io2m2mekLx7VtECi1lUxp85keMEmDqDJkGvNbYrHdW MhbL7VtzFpoKwTQjUlfctG+AcnosQTAkVOvOYxdBuUSq0lgBoTUY6LyTZGLs WONwcn6lKZQCulHtV4V5u0Oq4suZgQ1evHWSDwAfYcx+tWSjEfl8MePunlUY r6ysqZr4ZM0hSQh4CAacd4fPkYQKgKKgAVY7AvgDmijz =gx2W -----END PGP MESSAGE-----