|
July 15, 2012, 01:02:18 AM Last edit: September 19, 2012, 02:01:20 AM by Hasimir |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Hello,
I know there are a number of people already using GPG effectively here (and elsewhere), but I am sure there are plenty more who want to use it and just can't quite get a grip on it.
I have been using GPG since the Crypto Wars of the 1990s and these days I use it constantly. I'm also a qualified trainer and understand the different ways people need to learn.
Someone struggling with this topic and often many confusing explanations, or who just does not have the time to investigate the online manuals and mailing lists, could benefit from my knowledge and experience.
What is offered (in roughly the order they would be taught or demonstrated):
* One-on-one instruction, primarily via email or IM. IM is subject to timezone compatibility. * Explanation of the basics of public key infrastructure (i.e. how it all works). * Step-by-step instructions on installing GPG4Win for Windows and/or GPGTools for Mac OS X. Linux distributions should already have GPG installed. * Modifying the GPG configuration file to include some more advanced options (e.g. setting cipher preferences, activating DSA2, setting default keys, using group lines). * Using expert mode to generate a custom or advanced key (e.g. to mix RSA and Elgamal). * Editing a key to add subkeys. * Explanation of the purpose of signing keys, signing messages and the Web of Trust. * Exporting the public key, backing up the secret key. * Configuring Thunderbird and the Enigmail add-on. * Testing the ability to send and receive encrypted email and signed email.
If it is of interest, the following more advanced options are available:
* Step-by-step instructions on how to compile GPG 1.4.x on *nix systems (e.g. Linux or OS X with Xcode). Will include Camellia and IDEA. GPG-Agent is optional (user's preference). * Configuring a key to only use the subkeys for day-to-day use (to keep the master key off an active system). * Command line instruction to achieve tasks not readily available through the GUI frontends (e.g. hiding recipients, protecting against Van Eck Phreaking, identifying a session key, decrypting a specific message with a session key, using symmetric encryption). * I will answer any question on the topic (assuming the answer is known or there is an answer) or will attempt to locate the answer. If something is obscure enough that I don't know the answer I will NOT charge for the time it takes to find the answer.
What is NOT offered:
* An explanation of the mathematical algorithms which comprise the ciphers and hashes. This is a practical course, not a post-graduate mathematics course.
My fee for this service is 15.0 BTC for the first 3 hours and 7.0 BTC for every hour thereafter.
Fees may be adjusted depending on currency fluctuations against my local currency. But the current fees have been selected to handle a certain degree of fluctuations in the BTC value.
Regards, Ben -----BEGIN PGP SIGNATURE-----
iQGcBAEBCgAGBQJQWSdWAAoJEH/y03E1x1U8Z88L/RZtgcJ3uMVXUhGNJSDoTTCl oe3iGI7y/FX/Lpze/+beb/Zh+aQ48QRqHu67ez4vZXoNUVC2W4oHdtgi9jsV/Jts nbe0QAO4UeQCwYxTDsDnyFLR8fXv5uKhNU4tLR0d/Wvwsqpkum2crm0q7fqZLQ4b uWjoHGSHBzQva8DkQsIK19vj8hgGIKqFnAPcRQ0fMhHk6NL1/hvPJYYefqolp6+L W0EbxMk/wjJ9oRs8QOglsxC3+xUdOfZd87t1qOTHLxcM35R0oxi/bMqXt4XOIBbJ l/7iG5QjPyMtWHIlgfp7toUMD3PPj9Vy0TWSzORpyPYY5KxxOpZ7ATE0oCiyJl5U 49ErZvMx3HOVE6Cvc4S7tUP8LdX6JBtrVxH+vYTCAzJggfvwhgVcphxzy/OsNZCr 8XindNCz2t6EBXn1/ZG5p7TDuVCZ7bC24Md+zH+DYPndFC7w3Z1LP2b94uB64CE7 0PW2V6v9ZMMmG+sSWNz6Hm8qs76lSOQO6fd7e9guZw== =Jq+9 -----END PGP SIGNATURE-----
|