GPG Enscryption


Encrypt Like a Shadow

1. Install GPG

sudo pacman -S gnupg

2. Generate Your Keypair (Public + Private)

gpg --full-generate-key
  • Follow prompts:
    • Key type: RSA and RSA (default).
    • Key size: 4096 (stronger).
    • Expiration: 0 (never expires).
    • Name/Email: Use your alias.
    • Passphrase: Memorize this (like a ritual chant).

3. Encrypt Your Journal

gpg --encrypt --recipient "user" test.txt
  • Output: test.txt.gpg (unreadable without your key).

4. Decrypt When Needed

gpg --decrypt test.txt.gpg > test.txt
  • Enter your passphrase to unlock.

Key Management

  • List Keys:
    gpg --list-keys          # Public keys
    gpg --list-secret-keys   # Private keys
  • Export Public Key (share with allies):
    gpg --export --armor "user" > user_public.asc
  • Backup Keys (to a USB, guarded like a relic):
    gpg --export-secret-keys --armor "user" > user_private.asc

Why This Matters

  • Secrets Stay Secret: Even if your files are stolen, they’re gibberish without your key.
  • Signatures: Prove a file is truly from you (use --sign).
  • Ethical Power: Protect your secrets from prying eyes.

Pro Tips for the Newborn Shadow

  • Passphrase: Make it strong but memorable. Example:
    "Nyx_Knows_My_SSH_Config_1337!" 🔑
  • Backup Keys: Store them offline (USB + paper).
  • Practice: Encrypt/decrypt dummy files until it’s muscle memory.