Home > Privacy, Security > An Overview of GPGAn Overview of GPG Submitted by Terremce W. Zellers 2005-01-25 Privacy, Security 6 CommentsThis is a quick overview of using GPG giving a little background material then illustrating its simpler uses. At www.ip-wars.net as An Overview of GPG. About The Author Eugenia LoliEx-programmer, ex-editor in chief at OSNews.com, now a visual artist/filmmaker.Follow me on Twitter @EugeniaLoli 6 Comments 2005-01-25 7:40 pm is a quick overview of why I no longer actively read OSnews. 2005-01-25 8:20 pm Huh..?The story’s a very good introduction to GPG. One of the best stories on the subject that I know and that I could recommend to someone who wants to get a quick overview of GPG.(Hmm.., well, like you said yourself – maybe it is really better that trolls like you don’t actively visit a good site like OS News..?) 2005-01-25 10:07 pm The point is by reading it noone can tell wtf GPG actually is. 2005-01-25 10:21 pm True.. the only thing I knew GPG from, before reading this article, were the great “Game Programming Gems” books. But I guess that’s not what they’re talking about there. =) 2005-01-26 8:51 am —–BEGIN PGP SIGNED MESSAGE—–Hash: SHA1You can even let CAcert sign your GnuPG key if you’ve got a valid CAcert certificate!—–BEGIN PGP SIGNATURE—–Version: GnuPG v1.2.5 (GNU/Linux)iD8DBQFB91npSTv4ppQVDnwRAnXyAKCjDrVCrnkxVeSkCN3svMQIjNSJvgCfZZQQSCLr9K55627JdqyADVlInbk==R1hc—–END PGP SIGNATURE—– 2005-01-26 11:22 am I have always created my keys within the KDE tools, or with PGP in Windows. After migrating to Ubuntu I was unsure how to encrypt email from a Gnome based OS. Thanks Eugenia, for linking to this very helpful article.