Picture of Encrypt your Gmail Email!
If you want to be sure that your email can be read by no one but you, then it needs to be encrypted. You'd be surprised to find out who might want to read your email. I was.

One of the best encryption systems is called GPG encryption which is an open-source version of PGP encryption. PGP stand for Pretty Good Privacy and is actually an understatement made by a programmer who didn't want to be too optimistic about how secure it is. However, as it turns out, PGP is has actually proven itself to be extremely good. It's been around for many years, being maintained by the best coders in the world and it hasn't been cracked.

In this Instructable, I'll walk you through the simple process of setting up GPG and then installing a Firefox plugin that will make it easy to encrypt your Gmail.

Step 1: How it works

Picture of How it works
The principle behind GPG encryption is easy. Anyone who wants to play creates a public key and a private key. Your public key is the part of the encryption that you make public. Your private key is the part of the encryption that you never share with anyone under any circumstance.

The two keys work together so that you need both to decrypt anything. To send an encrypted message to someone you lock the message with their public key and when they get it, they can unlock it with their private key. If they want to respond, then they encode the message with your public key and you can read it with your private key.

Of course, this only works so long as you can trust that you have been given the right public key and that you know who you are talking to. One of doing this is by having a key signing party with your close friends. You all show up at a given location at a given time and exchange public keys. Then you have a list of trusted public keys with which you can communicate. This is often referred to as a web of trust.
1-40 of 72Next »
BryanL136 days ago

"The two keys work together so that you need both to decrypt anything."
I believe this is wrong. You should only need the private key to decrypt, which is also what is shown in your diagram.
Unless you are referring to signing, which does have an decryption step using the public key at the receiver.

MatthewR152 months ago
ok, so M.R (?)
Lete get started
MatthewR152 months ago
ok, so M.R (?)
Lete get started
MatthewR152 months ago
protection of https://privatoria.net/
suzysmith244 months ago
whenever i try to upload an instructable it says "verufy your email"how in the world do i do that?
StanleyM25 months ago

I prefer 'double encryption' The service that I use

https://privatoria.net/ encrypts my text message and sends it over a secure SSL channel. That way you'll have to break one encryption just to get to another one

I also prefer the protection of https://privatoria.net/

It is easy to use and secure.

andybuda6 months ago

what bin did you rescue that computer from?

bradleybc7 years ago
Hasn't been cracked? C'mon, a cipher cracking util run on the fastest desktop PC would take about 22,000 years to decipher. On the other hand, the NSA's "BrainChild" supercomputer can solve it in about 20 minutes. So, it really depends on who you are trying to hide information from...
muzac bradleybc6 years ago
Actually, agents from the Secret Service themselves are admitting that if something is encrypted with PGP, it's pretty much impossible even for them to crack (mentioned in this article). The NSA may be able to crack it, but I've seen no published cases on this. It seems like if someone encrypts with PGP, anyone (including the government) wanting to decrypt the info tries to just find ways to swipe the key from somewhere, instead of a "brute force" method.
For all we know, they could already have cracked it a long time ago, and they already read everything encrypted or not. They just aren't telling us to give us a false sense of security.

thanks to Snowden we know they haven't :) http://www.theverge.com/2014/12/28/7458159/encryption-standards-the-nsa-cant-crack-pgp-tor-otr-snowden

The thing is, with enough time anything can be cracked but without knowing how long the original passphrase was it's pretty hard to do anything. My passphrase is in the neighborhood of 16+ characters which means they would have to make a list of all the possible strings that are 16 characters long, 17 characters long, etc until they cracked it. Without knowing that my passphrase is 16 characters at least though, you'd have to run through all the 1 character, 2 character, 3 character, 4 character, etc. passwords possible and finally be able to crack the passphrase. It'd take a wicked long time but eventually anything can be bruteforced. Just me $.02
If you were a suspect for a crime, they would probably just install malware on your computer, steal your password and not have to brute force anything. Or they can force you to reveal your passwords with torture or sever criminal penalties.
l2crypto https://class.coursera.org/crypto-preview/lecture/index

Its all about reducing your odds. The best method for decrypting hashes is rainbow tables but that was solved by adding salt to the hash's. Private Public key crypto is much more complex by requiring multiple factors required to decrypt ans since gpg is an opensource crypto its been reviewed publically by many its very difficult to decrypt anything gpg related without two things your private key and your passphrase. You'd really have to try hard to replicate either of these things.
EricE78 months ago

In addition to keep the message private when it is transmitted between the sender and the receiver, does GPG keep the message encrypted in each party's mailbox? If not the case then how can I have my message stored in my Gmail mailbox in a way that even for Google couldn't read it?

tsaltzman1 year ago

Sounds good, but I don't care if the government/hackers reads my emails.

You would if you were communicating with marketplace vendors.


If you're buying illegals on the darknet then yeah mabye, unless you have a prison wish.

For purchasing Illegals on the darknet, yeah.

istevee1 year ago

I could also recommend www.securencrypt.com . It's free, has trusted lists, comes with encryption for emails, files and even SMS if you use the mobile version.

tinja1 year ago
I tired Galaxkey thanks for telling me about it, its really great! so easy to use.


rejoraju2 years ago
Find out how to encrypt your mail in Chrome and Mozilla in a very simple steps, no need to be tech savvy to do this work.

Learn how to Encrypt your mail in Gmail using Chrome


and also see how you can encrypt your mail in Mozilla

jacktrades3 years ago
You can also try:

It's a browser extension for Gmail, PGP like.
kpatel183 years ago
Yup now a days gmail has 2 step security features also so no 1 can hack your mail.
< a href=”http://thexbit.com”>
pabloreyas3 years ago
This is the beast service for Secure Encripted Email!
Yeah is true, i use this service from 11 month and is really Excellent!
they have also a very good support.
For who want know more go here http://en.kryptotel.net/kryptomail.html
bfarnsworth4 years ago
It is discontinued. http://getfiregpg.org/s/gmailstatut
bijikenyot4 years ago

-nokia PIN
Mark Regan6 years ago
But I thought that gmail automatically appends your IP address. Therefore, "big brother" can easily trace any encrypted message back to your computer and, with or without a search warrant, even via a "black bag job", find out what you typed even before it was encrypted. There is no easy, reliable method of ensuring that anything is confidential anymore.
If u use TOR to surf gmail, u essencially cant be traced
psssst......voice down
si7 years ago
FWIW, I use a combination of a Truecrypt (Windows/OSX/Linux) encrypted volume to store a Keepass (Windows) database to maintain my passwords. There are similar password managers to Keepass for OSX and Linux. This means I only ever have to know one (very strong) password, all my other passwords are generated using Keepass, and are typically 30 random characters (including non alpha-numeric characters) or whatever the maximum number and type allowed by the particular system. This means I don't know my own Gmail password, and because the password database is double encrypted (Truecrypt volume + Keepass db) with AES, I can safely keep it on my USB flash drive, and not be worried if I lose it. The other nice thing about Keepass is you can attach files, so I also have my PGP keys stored in there as well. Yes, it's putting all your eggs in one basket, but it's a redundant, strong and secure basket!
But aren't you hooped if you lose the usb key? You'd never be able to open your email again.
Ah...yes, you are correct, but there was one other tool I didn't mention as I didn't want to get too geeky :) I also use a version control system - Subversion - which I use to store (amongst other things) the Keepass database on. This means I can have a (working) copy of the encrypted keepass file in multiple areas, on my usb key, on my home pc, etc. and I use Subversion to keep these up to date. Subversion by default does not transfer or store securely, there are ways around this, but it's not necessary since my Keepass db is encrypted with AES.
vov35 si4 years ago
hmm... an 'ible on secure subversion perhaps?
or just an explanation...
eecharlie si5 years ago
So, does this mean that your USB stick holds, in addition to your keepass db in a truecrypt volume, stand-alone & multi-platform versions of both keepass and truecrypt?  Otherwise, wouldn't you only be able to access your passwords (and gmail) if you're on a computer with all that already installed?

And maybe you throw a couple firefox plugins on there while you're at it?
I think it's discontinued.
Really glad for this helpful and useful guide. I'm using a PC and I'm sure many others are too. Can we get a guide for using GPG on our boxes? Thanx.
1-40 of 72Next »