One of the reasons why I opt to use the GPG Suite on Mac is because it integrates seamlessly with Apple Mail. SEE: Boost your Mac productivity with these 10 techniques (free PDF) (TechRepublic) Signing and encrypting email If you want to make it easier for people to add your public key to systems (so they can send you encrypted email), okay the upload. If you don't want to make this public key available for anyone to download, click No, Thanks!, and you're ready to continue. Do this until you are prompted to upload your public key to the default GPG keyservers. You will be instructed to work on your machine (typing, clicking, etc.) to generate entropy. If you want your key to be permanent, uncheck Key expires, and click Generate Key. In this section, you can select your key type/length, add a comment, and change the expiration date.
#Gpg suite mac review install#
In the resulting popup ( Figure A), double-click on Install and walk through the installation wizard.Įnter the required information and then click Advanced options. Once you've downloaded the file, double-click on the download to mount the image. The first thing you must do is download and install the GPG Suite. I will be demonstrating on macOS High Sierra. I'm going to show you how you can get this open source app installed and use it with the likes of Apple Mail.
#Gpg suite mac review software#
This particular software will install GPGMail (an open source plugin for Apple Mail), GPG Keychain (an open source application for macOS that allows you to manage OpenPGP keys), GPG Services (a plugin that brings GPG to nearly any Mac application), and MacGPG (the underlying engine for the GPG Suite). You can install the likes of OpenPGP from the standard repositories and easily use it from the command line or from within apps like Thunderbird.īut what if macOS is your platform of choice? What do you do? You have a few options, one of which is to install the GPG Suite of tools. If you use a Linux machine, working with various encryption tools is incredibly simple. You have business and personal information you need to transmit or share, and doing so without first encrypting said information is a risk. In today's world, security and privacy are key.