Elaborate looking key on an old leather desk blotter

๐Ÿ’ป AGE Authenticated Encryption to replace GPG/PGP โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

This page is about using AGE to replace GPG/PGP for encryption. ...

March 26, 2023 ยท 3 min ยท Jas
An old letraset transparency

๐Ÿ’ป How To Setup A Yubikey โ›“ ๐Ÿ” โœจ

A Yubikey is a physical security device for your computer (and phone if you get the NFC version). In this post we will look at adding GPG and SSH keys to the Yubikey for additional privacy and security. ...

March 1, 2022 ยท 12 min ยท Jas
Elaborate looking key on an old leather desk blotter

๐Ÿ’ป Send and Receive GPG Email on MacOS โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

February 25, 2022 ยท 4 min ยท Jas
Elaborate looking key on an old leather desk blotter

๐Ÿ’ป Exchanging GPG Public Keys โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

February 3, 2022 ยท 2 min ยท Jas
Elaborate looking key on an old leather desk blotter

๐Ÿ’ป Create GnuPG Master Keys and Subkeys โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

January 12, 2022 ยท 6 min ยท Jas
Elaborate looking key on an old leather desk blotter

๐Ÿ’ป Installing and Configuring GPG โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about installing and configuring the GPG program on your computer. ...

December 19, 2021 ยท 1 min ยท Jas
Elaborate looking key on an old leather desk blotter

๐Ÿ’ป The Ultimate Guide to GPG for Email Security โ›“ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

There are many guides on the web for setting up GPG keys. Most of the one I have come across are outdated, or simply incorrect. This is an attempt to right those wrongs. ...

November 25, 2021 ยท 4 min ยท Jas
Artistic representstion of a VPN on a mobile device

๐Ÿ’ป Setup AWS EC2 Host for Wireguard Private VPN ๐ŸŒฉ ๐Ÿ” ๐Ÿ‘ฉโ€๐Ÿ’ป

(Part 1/3) In this post, I shall manually setup from scratch a Wireguard VPN on an AWS EC2 instance and make it available for secure browsing from my mobile devices. This setup process will be full manual for our first post, to understand all the principles and terminology before Post 2 where we will use the AWS CLI and Ansible to provision the EC2 instance; and later Post 3 where we will use Terraform and Infrastructure-as-Code principles to create the whole setup automatically. ...

October 2, 2021 ยท 29 min ยท Jas