With the introduction of OS X 10.8 a very handy plugin for the native mail app was rendered unusable –
although the guys from GPG-Tools are working on an update to make their tool work with the native mail app luckily the guys from GPG-Tools worked hard an finally delivered their GPGMail2 plug-in.
However, some people might still considering installing Gnu Privacy Guard on their local machines, to not fall victim to any characteristics of a future OS update. If this sounds like you, this log will (hopefully) be a handy note on how to install this great piece.
After you have opened your Terminal, you start-off by downloading the desired version (and its corresponding signature) from gnupg.org.
To ensure the originality of your obtained file you should consider to run following command
what should yield you a value of
790587e440ec7d429b120db7a96a237badc638fd. If it does not, stop here and contact the guys at gnupg.
I assume however, that you got a valid distribution. You may untar, change directory and configure your
I assume that you do not yield any error when running the tests, so that we are good to go and install with the well known method, namely
make check and finalize this procedure with
sudo make install.
Now that everything is set up, it’s time to generate some random numbers and afterwards our keys.
According to your system language the output will vary. Nevertheless you are free to choose whatever suits your needs most, I have chosen (1). Next steps are pretty straight forward and self explanatory. After the process will be finished you will end up with a generated public and private key. Some important functions for you may be the
--list keys option, which yields all available keys in your
pubring.pgp file, or the command
This will yield your public key block which you can save and send to your addressees so they will be able to encrypt their messages for you. To import a public key, just use the
--import command which should be followed by the key file you want to use. Encrypting a file can be achieved by the first command, decrypting by the second.