How to do End-to-End Encryption without an App (Intro to GPG)
Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about GPG (GNU Privacy Guard - which is an Open source implementation of PGP) and you will learn how to use the Public Key infrastructure to encrypt anything end to end, even while you post in social media, private messages, and email. There's no limit to where this can be used. This will explain the use of GPG in a simple way, without command line instructions, or even requiring the use of a specific app and a clear explanation of how it works without the technical jargon.
This has been the biggest flaw of PGP in the past. Hardly anyone understood it. So by simplifying the explanation, hopefully more people will use it in its new form as GPG.
--------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
Support this channel on Patreon! https://www.patreon.com/user?u=17858353
https://bytzVPN.com Premium VPN with Cloud-Based TOR Routing
https://whatthezuck.net Cybersecurity Reference
https://brax.me Privacy Focused Social Media - Open Source - Encrypted Communications
https://brax.me/home/rob Store for BytzVPN, BraxWifi Router, Privacy Phones, and merchandise
My GPG Public Key https://brax.me/f/rob_braxme_public.asc/T4AZ5eaa7ec492c0a3.25114964
Please follow me on Odysee! (Previously LBRY.tv)
https://odysee.com/$/invite/@RobBraxmanTech:6
Видео How to do End-to-End Encryption without an App (Intro to GPG) канала Rob Braxman Tech
This has been the biggest flaw of PGP in the past. Hardly anyone understood it. So by simplifying the explanation, hopefully more people will use it in its new form as GPG.
--------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
Support this channel on Patreon! https://www.patreon.com/user?u=17858353
https://bytzVPN.com Premium VPN with Cloud-Based TOR Routing
https://whatthezuck.net Cybersecurity Reference
https://brax.me Privacy Focused Social Media - Open Source - Encrypted Communications
https://brax.me/home/rob Store for BytzVPN, BraxWifi Router, Privacy Phones, and merchandise
My GPG Public Key https://brax.me/f/rob_braxme_public.asc/T4AZ5eaa7ec492c0a3.25114964
Please follow me on Odysee! (Previously LBRY.tv)
https://odysee.com/$/invite/@RobBraxmanTech:6
Видео How to do End-to-End Encryption without an App (Intro to GPG) канала Rob Braxman Tech
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Is Protonmail Safe for Security and Privacy?](https://i.ytimg.com/vi/8Ppl62Bl9RE/default.jpg)
![Setting Up Your New Computer Safely](https://i.ytimg.com/vi/QHPJirrluT8/default.jpg)
![Edward Snowden: How Your Cell Phone Spies on You](https://i.ytimg.com/vi/VFns39RXPrU/default.jpg)
![Is Online Shopping Safe for Privacy?](https://i.ytimg.com/vi/3yk8S_ZQzM0/default.jpg)
![Live - Seriously Folks - Time to Change Phones! Or You get Zucked](https://i.ytimg.com/vi/Qyt7vzg67f4/default.jpg)
![The Story of Microsoft - How a Computer Club Took Over The World](https://i.ytimg.com/vi/Xjq0kljBZnY/default.jpg)
![How to use Tor Browser | Tor Tutorial part 1](https://i.ytimg.com/vi/yveTy-mf3u8/default.jpg)
![GPG encryption demonstration. Create symmetric asymmetric public key private key tutorial](https://i.ytimg.com/vi/FLZLVqceAeA/default.jpg)
![Best Secure Instant Messaging Apps for 2021](https://i.ytimg.com/vi/ke8pXQQPaIw/default.jpg)
![](https://i.ytimg.com/vi/rUqLKUDuo_8/default.jpg)
![How to Encrypt Your Passwords with Emacs](https://i.ytimg.com/vi/nZ_T7Q49B8Y/default.jpg)
![Writing Secure Node Code: Understanding and Avoiding the Most Common Node.js Security Mistakes](https://i.ytimg.com/vi/QSMbk2nLTBk/default.jpg)
![How to Properly Use Cloud Storage | Rsync Encrypt Tutorial](https://i.ytimg.com/vi/KBr_qf5G4CY/default.jpg)
![Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?](https://i.ytimg.com/vi/EawS7CAUrf8/default.jpg)
![Android without Google Services - Does it work?](https://i.ytimg.com/vi/AjTTKXHwzXc/default.jpg)
![Why You should Dump Your Apple and Google Phone - Top 5 Reasons!](https://i.ytimg.com/vi/3RXs1e7FcJg/default.jpg)
![Defending Your Privacy with Disinformation - Top 3 Tips](https://i.ytimg.com/vi/bcdC3FqUods/default.jpg)
![Best Cloud Storage 2021 – Comparing Price, Security, Lifetime Plans and Collaboration](https://i.ytimg.com/vi/8VxRbEdmOKo/default.jpg)
![Intro to Signal Protocol and Signal Source Code](https://i.ytimg.com/vi/L2kuipP3lxk/default.jpg)
![3 Ways to Secure Your React Native App - React Native - October 2019](https://i.ytimg.com/vi/CwFD_Eb_0Qo/default.jpg)