You are here
Home > Survival > PGP for Preppers- Part 1, by Groundhog Gravy

PGP for Preppers- Part 1, by Groundhog Gravy


We all have a need for private communication. Whether it’s details of our preparations that we want to share with others in a group, discussing tactics, carrying on trade, or any of a hundred other matters, we should be concerned about keeping our communication private. We should be especially careful when communicating electronically: it’s little more than trivial for a government, a corporation, or even a couple of well-equipped criminals to intercept phone calls, emails, or text messages. We can use encryption, which transforms data into a form that can only be read with a secret key, to help preserve our privacy.

Providers That Purport To Keep Emails Private

There are plenty of e-mail providers that purport to keep your emails private, e.g. Hushmail, ProtonMail, and SCRYPTmail. There are also encrypted messaging providers, like Signal and Telegram. I don’t trust them, and neither should you. Take Hushmail, for example. They claim to store only encrypted e-mails, which not even their own employees can read. However, they have released decrypted e-mail data to authorities pursuant to a Canadian court order, and their revised terms of service suggest they will continue doing so. The others have similar problems, having servers in troubling jurisdictions or having weak or subpoena-vulnerable storage of encryption keys. You simply can’t know what’s happening to your data once it’s on someone else’s server.

Encryption Failures in the News

Even lately, encryption failures have been in the news. The EFail exploit, based on how many email clients implement PGP encryption, and a similar flaw was discovered in Signal and Telegram, both which reveal the clear text of what you meant to keep secret.

The Problem Was Not Encryption

The problem was not encryption in any of these cases. The problem was how it was implemented into other programs. This article will explain how to use simple, secure tools that do only encryption and do it right.

The Solution: PGP

The best solution to the encryption problem has been publicly available for almost three decades. It’s a cryptographic standard called PGP (or Pretty Good Privacy, which is an awful name since it’s far more than pretty good). PGP allows people to encrypt messages to one another that nobody but the recipient can access. It is battle-tested and proven, and there is considerable evidence that groups, such as the U.S. FBI, the British GCHQ, the Italian police, and U.S. Customs do not have the ability to break it.

Its creator was under criminal investigation for several years under laws prohibiting export of munitions for distributing PGP online, but that investigation has been closed and the underlying laws have been relaxed. PGP software is freely available and legal to possess and use, at least for now.

The main implementations are the current incarnation of the original PGP software, and a free implementation, GnuPG (usually called GPG), whose source code is freely available for review and auditing.

Asymmetric Encryption

Usually, when we think about encryption, we imagine it like a fancy version of the decoder rings we had as kids from cereal boxes: if you and your friend have matching decoder rings, you can encode and decode messages to each other. Encryption where the same key both encrypts and decrypts is called symmetric encryption, and it’s sometimes useful. However, for many purposes, it has a serious flaw: for someone to send you a message, they need a key, and that key would allow them (or anyone that got access to it) to read any other message encrypted for you, no matter who wrote it. That’s more trust than we ought to have for anyone.

To avoid that problem, PGP makes use of a technique called asymmetric encryption, where you have two keys:

  • Public key, which is freely distributed so others can use it to encrypt messages for you, and a
  • Private key, which is kept secret and used to decrypt messages encrypted with the public key.

Think of Asymmetric Encryption as a Secure Shipping Box

You could think of asymmetric encryption as a secure shipping box. The more people with a key that can unlock the box, the greater chance there is of a mistake or malicious action that could expose the contents. So if I wanted to send you a secret in the box, you might give me a key that could lock the box but not unlock it (the public key), and you would keep the only key that could unlock it (the private key). As long as you never give anyone else the key that can unlock the box, you can be certain that nobody but you can get the secret.

Related:  21 Things Your Burglar Won't Tell You

To send the secure shipping box, you could use any “shipping service” that will carry it, whether UPS, FedEx, or the USPS; likewise, with the encrypted message, you can send it by e-mail, Facebook messages, handing a flash drive to each other, or whatever. When the message gets there, it’s still secure.

A Simple Example

Say you had a message for me. For example:

Your article on PGP encryption was dumb and you are ugly. I hope your livestock die of scours!

You could then look up my public key. It’s easily available, because I want everyone to have it. You encrypt your message. (We’ll go into how to do that in just a bit.) Here it is, if you want it:


With that key, you encrypt the message, and you get something like this:


You can’t decrypt that with my public key. Nobody can, including the NSA, FBI, CIA, DHS, or Campbell’s Alphabet Soup. Furthermore, even the combination of that encrypted message and the cleartext doesn’t give them the ability to decrypt future messages. But, if you send it to me, with my private key I can easily read it:

Your article on PGP encryption was dumb and you are ugly. I hope your livestock die of scours!

That was not a particularly nice message.


It’s good to be able to receive messages that only you can read, but we know that email is inherently insecure. What’s to stop some little tyrant-in-training from intercepting the email and replacing the message above with another? After all, your key is public; anyone, even your worst enemy, can send you an encrypted message. We need to have some way of indicating by whom the message was encrypted. Luckily, there is a way. You sign the message, giving it an encrypted pattern that can only be produced with your private key.

How To Use PGP

People say PGP is hard to use. They bring up the security researcher who has a couple of old public keys floating around for which he has lost the private key, and so receives mail neither he nor anyone else can read. Often they point to the security employee at Adobe who posted their private key on the Adobe Security Incident Response Team blog. They also mention the well-known and widely-used e-mail encryption plugin that has had bugs that saved drafts in clear text, and even sent emails unencrypted if there were only BCC recipients, if used with the wrong Thunderbird version, or if a user chooses a perfectly reasonable set of preferences that happen not to work.

These things really did happen, but they and similar problems can be easily avoided by following two simple rules:

  1. Keep your private key to yourself, and
  2. Don’t trust any encryption you can’t see.

Keep Your Private Key, and Keep It To Yourself

Put your private key on a flash drive. Print a paper copy of it. Wrap the flash drive in tin foil. Put them both in your EMP-protective safe.

Don’t Trust Any Encryption You Can’t See

Do the encryption yourself, with a tool that keeps you in control of your encryption. For example, if you’re sending an encrypted e-mail, the only text that should go into the email is what you have already encrypted. Don’t trust encryption you can’t see, and remember that clear text should never go in an insecure tool.

GPG and Gnu Privacy Assistant

The most commonly-used and trustworthy of the OpenPGP implementations is GnuPG, or GPG, from the Gnu Project– a software-freedom advocacy group. GPG has the following advantages:

  • It’s free to obtain.
  • The source code is freely available for review (open-source).
  • It is widely-deployed and battle-tested.
  • It is up-to-date, providing encryption that should remain unbreakable for the long term.

GPG by itself is an expert tool, used at the command line, without a friendly graphical user interface (GUI). It is not self-explanatory, and it takes practice and study to use correctly. Luckily, there are several GUI wrappers for GPG that are simple, self-explanatory, and user-friendly.

The simplest, most usable of these GUI wrappers for GPG is the Gnu Privacy Assistant (usually called GPA). I recommend it because it makes it easy to see what you’re doing and avoid mistakes. Otherwise, it has the same advantages as GPG.

Installing GPG and GPA

For Windows, download Gpg4Win and follow the installation instructions. For Mac OS X, do the same from GPGTools. In either case, there may be a place to tick a box to also install GPA. Make sure to do this.

Related:  Why and How to Grow Kohlrabi

On Linux, install GnuPG and GPA from your package manager. Almost any Linux distribution should have a recent version available.

Generating a Keypair

When you open GPA for the first time, it will prompt you to create a key. Click “Generate key now”. When you do, it will ask for:

  • Real Name: Enter your real name or a pseudonym; if you want your people to be able to find your key, choose something they know to look for.
  • Email: Again, real or fake; it’s probably best to enter a real one so people don’t give up and mail you unencrypted material.
  • Create Backup Copy: Do this! Back it up to a USB drive and stick it in an EMP-protective safe. Print off a copy and secure that, too. If you lose this key, you won’t be able to decrypt messages.
  • Passphrase: This should be long, easily remembered, and include something that’s not in the dictionary, like punctuation and numbers. If you are sure you can remember it, great. If not, write it down and put it in the safe. You need it to use your private key. (GPA will ask you for this a few times while creating your key.)

At this point, if you’ve followed the instructions, you have created a key. Tomorrow, in Part 2, I will cover some things you may want to do with it.

See Also:

SurvivalBlog Writing Contest

This has been part one of a two part entry for Round 77 of the SurvivalBlog non-fiction writing contest. The nearly $11,000 worth of prizes for this round include:

First Prize:

  1. A $3000 gift certificate towards a Sol-Ark Solar Generator from Veteran owned Portable Solar LLC. The only EMP Hardened Solar Generator System available to the public.
  2. A Gunsite Academy Three Day Course Certificate. This can be used for any one, two, or three day course (a $1,095 value),
  3. A course certificate from onPoint Tactical for the prize winner’s choice of three-day civilian courses, excluding those restricted for military or government teams. Three day onPoint courses normally cost $795,
  4. DRD Tactical is providing a 5.56 NATO QD Billet upper. These have hammer forged, chrome-lined barrels and a hard case, to go with your own AR lower. It will allow any standard AR-type rifle to have a quick change barrel. This can be assembled in less than one minute without the use of any tools. It also provides a compact carry capability in a hard case or in 3-day pack (an $1,100 value),
  5. Two cases of Mountain House freeze-dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  6. A $250 gift certificate good for any product from Sunflower Ammo,
  7. Two cases of meals, Ready to Eat (MREs), courtesy of (a $180 value), and
  8. American Gunsmithing Institute (AGI) is providing a $300 certificate good towards any of their DVD training courses.

Second Prize:

  1. A Model 175 Series Solar Generator provided by Quantum Harvest LLC (a $439 value),
  2. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  3. A gift certificate for any two or three-day class from Max Velocity Tactical (a $600 value),
  4. A transferable certificate for a two-day Ultimate Bug Out Course from Florida Firearms Training (a $400 value),
  5. A Three-Day Deluxe Emergency Kit from Emergency Essentials (a $190 value),
  6. A $200 gift certificate good towards any books published by,
  7. RepackBox is providing a $300 gift certificate to their site.

Third Prize:

  1. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  2. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  3. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  4. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security, LLC,
  5. Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and
  6. Two 1,000-foot spools of full mil-spec U.S.-made 750 paracord (in-stock colors only) from (a $240 value).

Round 77 ends on July 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.

Source link

Leave a Reply