Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

How to do End-to-End Encryption without an App (Intro to GPG)

Автор: Rob Braxman Tech

Загружено: 2020-04-29

Просмотров: 28040

Описание:

Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about GPG (GNU Privacy Guard - which is an Open source implementation of PGP) and you will learn how to use the Public Key infrastructure to encrypt anything end to end, even while you post in social media, private messages, and email. There's no limit to where this can be used. This will explain the use of GPG in a simple way, without command line instructions, or even requiring the use of a specific app and a clear explanation of how it works without the technical jargon.

This has been the biggest flaw of PGP in the past. Hardly anyone understood it. So by simplifying the explanation, hopefully more people will use it in its new form as GPG.

--------------------------

I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)


Support this channel on Patreon! https://www.patreon.com/user?u=17858353

https://bytzVPN.com Premium VPN with Cloud-Based TOR Routing

https://whatthezuck.net Cybersecurity Reference

https://brax.me Privacy Focused Social Media - Open Source - Encrypted Communications

https://brax.me/home/rob Store for BytzVPN, BraxWifi Router, Privacy Phones, and merchandise

My GPG Public Key https://brax.me/f/rob_braxme_public.a...

Please follow me on Odysee! (Previously LBRY.tv)
https://odysee.com/$/invite/@RobBraxm...

How to do End-to-End Encryption without an App (Intro to GPG)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Противодействие наблюдению с помощью Bluetooth!

Противодействие наблюдению с помощью Bluetooth!

Have you been Hacked? Don't Panic. We've got you.

Have you been Hacked? Don't Panic. We've got you.

Make ANY Messaging Service E2E Encrypted With PGP

Make ANY Messaging Service E2E Encrypted With PGP

Единственный безопасный способ использования Windows 11 — навсегда удалить учетную запись Microso...

Единственный безопасный способ использования Windows 11 — навсегда удалить учетную запись Microso...

How Not to Screw Up Your Email

How Not to Screw Up Your Email

Какое программное обеспечение для шифрования вы рекомендуете?

Какое программное обеспечение для шифрования вы рекомендуете?

Каково это — использовать телефон без Google в реальной жизни? (вопросы и ответы)

Каково это — использовать телефон без Google в реальной жизни? (вопросы и ответы)

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Keeping Secrets: Emerging Practice in Database Encryption

Keeping Secrets: Emerging Practice in Database Encryption

DNS Privacy

DNS Privacy

Setting Up Your New Computer Safely

Setting Up Your New Computer Safely

RAIN RFID Explained

RAIN RFID Explained

Using Virtual Machines for Privacy and Security

Using Virtual Machines for Privacy and Security

Why The Cuts In The Capacitor Plates? Here's Why With Circuit Examples!

Why The Cuts In The Capacitor Plates? Here's Why With Circuit Examples!

Webinar | KnowBe4 Security Awareness Training

Webinar | KnowBe4 Security Awareness Training

Standard Notes - Encrypted, Cross-Platform Notes

Standard Notes - Encrypted, Cross-Platform Notes

7 Cryptography Concepts EVERY Developer Should Know

7 Cryptography Concepts EVERY Developer Should Know

How To Extract Plaintext Google Chrome Passwords

How To Extract Plaintext Google Chrome Passwords

Фотофон 1985 года: давно потерянный ретротехнический шедевр восстановлен!

Фотофон 1985 года: давно потерянный ретротехнический шедевр восстановлен!

STOP Using Proton & Signal? Here’s the TRUTH

STOP Using Proton & Signal? Here’s the TRUTH

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]