Subj : Re: Decoding this... To : Vk3jed From : Bbsing.Bbs Date : Wed Jul 31 2019 09:24 pm -=> Vk3jed wrote to Bbsing.Bbs <=- Bb> Perfect! It worked. Bb> BBS systems can have secure message communication! :) Vk> Cool, what was the total process? Sorry Vk, I went dark for awhile due to projects I was working on, and you may have the process already. Ah .. so if I can remember the total process... Here is the general process. make sure you have a pgp/gpg key, post your public key for the initial async encryption ... this is the type where you receive someone's posted public key and then add that to your keystore, then craft a message for that person's key. Now if its just synchronous then... they've sent you a shared single key. Here on the bbs or fido, .. other packet mails you can post the message using gpg output of ascii armor ... which is basically clear text. This text you'll also use to post your key but you can use binary formats. I like the armor text style because its really versatil. So if we were trading messages and we did not have a single shared key we would use asynchronous encryption to trade the key, or via phone ... something like that. 1) get gnupgp 2) create a private key 4096 bit a) smaller key sizes allow for easier signature line use, but may cost in compromised communicates if cracked. 3) output your public key to a file in armor text 4) place your public key in a signature line 5) anyone can get your public key and send you a private message that only you can unlock. openssl allows for armor text as well, but from the perspective of regular message communications like this one, only synchronous encryption (shared key). --- MultiMail/Linux v0.49 * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138) .