Generate GPG Keys With Curve Ed25519
18 minute read Published:
Trust the developers, not the code hosting infrastructure. ~Linux Kernel Maintainers PGP Guide
Why GPG?
“The distinction between what is public and what is private is becoming more and more blurred with the increasing intrusiveness of the media and advances in electronic technology. While this distinction is always the outcome of continuous cultural negotiation, it continues to be critical, for where nothing is private, democracy becomes impossible.” ~ Privacy Conference, Social Research, New School University
Too often these days with technology, insecurity lurks in the shadows of complexity. Getting back to primary tools is useful for reconnection to self and to freedom of expression. Quality of life is in direct correlation to the artifacts at our disposal.
Open Source GPG/GnuPG (Gnu Privacy Guard) and it’s proprietary pal PGP (Pretty Good Privacy) can be called upon to encrypt email, passwords, files, storage tombs, logical volumes and partitions. Moreover, GPG is required to sign git commits in collaborative work situations.
“I generally sign all of my mails because I believe it’s important. More than once it helped to prevent identity theft with people using a ‘similar’ email address to mine.” ~Anonymous
My primary motivation for setting up GPG is for use with Pass: The Standard Unix Password Manager
where each password or document is stored as an encrypted file. This guide will ensure that you are set up to encrypt, sign and authenticate with GPG.