8 |
|
|
9 |
Copyright (C) 2006 Timo Schulz |
Copyright (C) 2006 Timo Schulz |
10 |
|
|
11 |
Version 0.0.0 |
Version 0.2.0 |
12 |
|
|
13 |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
@settitle WinPT - The Windows Privacy Tray; a free GPG front-end for Windows |
14 |
|
|
24 |
recommend. The program also works on NT/95/ME but there is no support |
recommend. The program also works on NT/95/ME but there is no support |
25 |
for these OS versions any longer. |
for these OS versions any longer. |
26 |
|
|
27 |
|
@section A short Introduction |
28 |
|
|
29 |
|
WinPT is a graphical GnuPG front-end which resides in the task bar. |
30 |
|
It is divided into several, so-called, managers. There is a manager |
31 |
|
for the keyring, for files and for smart cards. The aim of the program |
32 |
|
is to secure email communication and to perform file encryption. |
33 |
|
|
34 |
|
@subsection What is GnuPG |
35 |
|
GnuPG is a tool for secure communication and data storage. |
36 |
|
It can be used to encrypt data and to create digital signatures. |
37 |
|
It includes an advanced key management facility and is compliant |
38 |
|
with the proposed Internet standard as described in RFC2440. |
39 |
|
|
40 |
|
@subsection The Web of Trust |
41 |
|
For a detailled description of these and other GnuPG topics, I |
42 |
|
recommend the available literature at http://www.gnupg.org. But |
43 |
|
at least a general overview should be given here. |
44 |
|
|
45 |
|
The certification scheme of OpenPGP does not base on a hirachical |
46 |
|
approach. Instead it uses a combination of ownertrust and direct |
47 |
|
key certification. Here is an example with Alice, Bob, Carol and Dave. |
48 |
|
|
49 |
|
Alice knows Bob and checked the fingerprint of Bob's key when he |
50 |
|
met him personally. Thus she knows that the key really belongs to |
51 |
|
its owner and he trusts Bob to certify other keys. Then she issued |
52 |
|
a signature on Bob's key. Bob knows Carol and also checked her identity. |
53 |
|
Then he signed her key. Alice does not know Carol, but he knows Bob |
54 |
|
and Bob trusts Carol. And because Alice trusts Bob, at a level she |
55 |
|
decided before, he also trusts Carol. It's a transitiv relation. |
56 |
|
Dave is isolated and does not know anybody from the mentioned persons, |
57 |
|
thus he is not in the WoT. |
58 |
|
Another very important point is, that the signer can decide, |
59 |
|
after the certification, how much he trusts the key owner to |
60 |
|
certify other keys. |
61 |
|
|
62 |
|
It is very important to check the identify of a key owner. Mostly |
63 |
|
this is done by comparing the fingerprint, which were submitted |
64 |
|
by phone or written down at a personal meeting, with the fingerprint |
65 |
|
of the key in the keyring. Please bear in mind that anybody can create |
66 |
|
a key with an email address and a specific name. Thus it is not |
67 |
|
recommend to sign keys without doing this check before! |
68 |
|
|
69 |
|
The fingerprint of the key is hexadecial (160-bit) sequence divided |
70 |
|
into 10 groups of 4 hex digits. You can get the fingerprint of a key |
71 |
|
by opening the key property dialog. There you can mark the fingerprint |
72 |
|
and copy it to the clipboard. The fingerprint of a key can be compared |
73 |
|
to human fingerprints, it is unique for each key. |
74 |
|
|
75 |
|
Example: 1D75 8108 5BC9 D9FB E78B 2078 ED46 81C9 BF3D F9B4 |
76 |
|
|
77 |
|
It is a good idea to publish your fingerprint wherever possible. |
78 |
|
For example via a business card or your website. |
79 |
|
|
80 |
@section Installation of the Program |
@section Installation of the Program |
81 |
|
|
84 |
Download the zip file with the binaries inside and unpack them in |
Download the zip file with the binaries inside and unpack them in |
85 |
a folder. All files need to be in the same folder, so if you change |
a folder. All files need to be in the same folder, so if you change |
86 |
the folder don't forget to move all files. |
the folder don't forget to move all files. |
87 |
|
You should also download and verify the signature of the packet to |
88 |
|
make sure that the release is really authentic. |
89 |
|
|
90 |
To activate the program you just need to start WinPT.exe. You should |
To activate the program you just need to start WinPT.exe. You should |
91 |
now see a little (golden key) icon in the taskbar which indicates that |
now see a little (golden key) icon in the taskbar which indicates that |
99 |
speaking users, I recommend the light version because it does not |
speaking users, I recommend the light version because it does not |
100 |
contain the 2 German PDF manuals. |
contain the 2 German PDF manuals. |
101 |
|
|
102 |
|
@subsection Getting the Source of the Program |
103 |
|
As free software, according to the GNU General Public License, |
104 |
|
WinPT also offers the source code for the program. It can be used |
105 |
|
for reviews, to compile your own binary and/or to modify and/or |
106 |
|
redistribute it or just to learn how it works. The source is available |
107 |
|
at the same place you downloaded the binary. If not, you should |
108 |
|
contact the author of the site. |
109 |
|
The entire program can be build with free software; the default |
110 |
|
environment is a cross-compiler hosted on a Linux box. All you |
111 |
|
need is the mingw32 packages, a working autoconf environment |
112 |
|
and the libs WinPT depends on (currently gpgme and libgpg-error). |
113 |
|
It is also possible to build the binary with cygwin/mingw32 on |
114 |
|
Windows but this environment is not actively supported and propably |
115 |
|
needs adjustment of the source. |
116 |
|
|
117 |
@subsection Configure the Program |
@subsection Configure the Program |
118 |
After the installation not much of the default settings need to |
After the installation not much of the default settings need to |
119 |
be changed. If you prefer a special keyserver, it is propably a good |
be changed. If you prefer a special keyserver, it is propably a good |
137 |
|
|
138 |
To enable keyring backups, the user can either decide to use the |
To enable keyring backups, the user can either decide to use the |
139 |
GPG home directory as the backup folder or any other folder. In |
GPG home directory as the backup folder or any other folder. In |
140 |
the latter case, a folder needs to be chosen. If the backup should |
the latter case, a folder needs to be chosen. |
|
also include the secret keyring, please check the corresponding box. |
|
141 |
|
|
142 |
|
|
143 |
@section The First Start |
@section The First Start |
144 |
|
|
145 |
This section is only important for people who never installed |
This section is only important for people who never installed |
146 |
and/or used WinPT before. |
and/or used WinPT before. |
147 |
|
|
164 |
secret keyring, at a @strong{safe} place. |
secret keyring, at a @strong{safe} place. |
165 |
|
|
166 |
@section Keyserver Access |
@section Keyserver Access |
167 |
|
|
168 |
An easy way to retrieve keys is the keyserver. You can think of |
An easy way to retrieve keys is the keyserver. You can think of |
169 |
it like a huge database with a lot of keys as its content. It is |
it like a huge database with a lot of keys as its content. It is |
170 |
possible to search keys by a pattern, a keyid or even a fingerprint. |
possible to search keys by a pattern, a keyid or even a fingerprint. |
180 |
or to search for a given pattern. |
or to search for a given pattern. |
181 |
|
|
182 |
@subsection Retrieve a key by Key ID |
@subsection Retrieve a key by Key ID |
183 |
|
The best way to fetch a key from the server is by the key ID. |
184 |
|
Just enter the key ID, it is always a good idea to prefix it |
185 |
|
with 0x and click the "Receive" button. |
186 |
|
|
187 |
|
An example: |
188 |
|
|
189 |
|
pattern: 0xBF3DF9B4 |
190 |
|
|
191 |
|
[Receive] |
192 |
|
|
193 |
|
|
194 |
@subsection Retrieve a key by its email address |
@subsection Retrieve a key by its email address |
195 |
|
If you only know the email address from your partner, you can |
196 |
|
enter it instead of the key ID. It is unlikely but possible |
197 |
|
that there are more keys with the same address. In this situation, |
198 |
|
WinPT will warn you that multiple keys were imported. The difference |
199 |
|
to the search function is, that the keys were dirctly fetched and |
200 |
|
not displayed as a key result list. |
201 |
|
|
202 |
|
|
203 |
|
An example: |
204 |
|
|
205 |
|
pattern: name_of_friend@@gmx.net |
206 |
|
|
207 |
|
[Receive] |
208 |
|
|
209 |
|
|
210 |
@subsection Search for a key by pattern |
@subsection Search for a key by pattern |
211 |
If you want to communicate with a new mail partner and you are |
If you want to communicate with a new mail partner and you are |
214 |
|
|
215 |
An example: |
An example: |
216 |
|
|
217 |
pattern: twoaday@@freakmail.de |
pattern: winpt@@windows-privacy-tray.com |
218 |
|
|
219 |
[Search] |
[Search] |
220 |
|
|
225 |
to your keyring. Now you can encrypt data with this key, for |
to your keyring. Now you can encrypt data with this key, for |
226 |
example an email. |
example an email. |
227 |
|
|
228 |
@section Adding new elements to your key |
@subsection Sending a Key to the Keyserver |
229 |
|
After you generated a new key pair, it is a good idea to send your |
230 |
|
key to the keyserver to make it available for other users. If you |
231 |
|
issue a signature, the key ID is part of the signature and people can |
232 |
|
automatically retrieve your key when they try to verify the signature. |
233 |
|
|
234 |
|
Actually, the action is performed in the Key Manager and not in the |
235 |
|
keyserver dialog. Just open the Key Manager, select the key you want |
236 |
|
to send right-click on it and chose "Send to Keyserver" in the popup |
237 |
|
menu. Then a message box with the result is shown. |
238 |
|
|
239 |
|
@subsection Add, Delete or Edit a Keyserver Entry |
240 |
|
The keyserver dialog allow to change the existing keyserver entries, |
241 |
|
to delete them or to add new entries. Just right click on a selected |
242 |
|
item and a popup menu will be shown with ("Edit", "Remove" and "New"). |
243 |
|
|
244 |
|
@section Using the Clipboard |
245 |
|
|
246 |
|
A major aim from the first day was, that the program does not |
247 |
|
depend on a special mailer client. For this reason it uses the |
248 |
|
clipboard to encrypt and/or sign data. |
249 |
|
For the examples, let's assume that you want to write a new |
250 |
|
mail or that you received a mail protected by GnuPG. |
251 |
|
|
252 |
|
@subsection Encrypt Data in the Clipboard |
253 |
|
Just copy the text from the mailer window into the clipboard. |
254 |
|
This is usually done by CTRL+C, make sure you really selected |
255 |
|
all portions of the text. Then right-click on the tray icon |
256 |
|
and select Clipboard->Encryption. Now a dialog is shown to |
257 |
|
select the recipients. This means you need to select all |
258 |
|
keys which should be able to decrypt the mail. Confirm with "OK". |
259 |
|
GnuPG now encrypts the data with the selected recipients. At the |
260 |
|
end a message box with the result is shown. Now the clipboard should |
261 |
|
contain the encrypted data. Just paste it into the mailer window. |
262 |
|
The output should contain a header and a footer |
263 |
|
"BEGIN PGP MESSAGE" and "END PGP MESSAGE. |
264 |
|
|
265 |
|
@subsection Decrypt/Verify Data from the Clipboard |
266 |
|
The most common case is propably that you got a signed email and |
267 |
|
now you want to verify it. For this procedure, you have to copy |
268 |
|
the entire signature in the clipboard. The easiest way is to |
269 |
|
use CTRL+A and CTRL+C, then all available text will be copied. |
270 |
|
WinPT (GnuPG) is smart enough to figure out the signature related |
271 |
|
data. Now go to the taskbar, display the popup menu and select |
272 |
|
Clipboard->Decrypt/Verify. Now a new dialog, the verify dialog, |
273 |
|
should be available on screen with all information about the |
274 |
|
signature. For example who is the signer, when was it signed |
275 |
|
how much do you try this key and what was signed and most |
276 |
|
important, the status of it (is the signature good or BAD). |
277 |
|
A special case is when you don't have the public key to verify |
278 |
|
the signature, if this happens WinPT offers to download the key |
279 |
|
from the default keyserver. If the key was not found, the procedure |
280 |
|
is aborted because without the key the sig cannot bed checked. |
281 |
|
|
282 |
|
@subsection Sign the Clipboard |
283 |
|
We assume that text that shall be signed is already in the |
284 |
|
clipboard. If not, select the text you want to sign and copy |
285 |
|
with via CTRL+C in the clipboard. Now go to the taskbar and |
286 |
|
open the peopup menu, Clipboard->Sign. If you just have one |
287 |
|
secret key, the passphrase dialog will be automatically shown. |
288 |
|
All you need is to enter your passphrase and confirm. In case |
289 |
|
of more available secret keys, a list with all keys is shown |
290 |
|
and you can select which key shall be used for signing. |
291 |
|
The output is always a cleartext signature which is in text |
292 |
|
format. Do not try to sign binary clipboard data, the result |
293 |
|
would be unpredictable and not readable by human beings. |
294 |
|
|
295 |
|
@section The Current Window Support |
296 |
|
Compared to the clipboard mode, the CWS mode has some advantages. |
297 |
|
Let us assume that you want to extract text from an editor window. |
298 |
|
With the CWS mode, the program automatically tries to focus the |
299 |
|
window to select the text and to copy it to the clipboard and |
300 |
|
execute the selected command (Sign, Encrypt, Decrypt). |
301 |
|
No manual user interaction is needed. Except this different behaviour, |
302 |
|
it is very likewise to the clipboard mode and thus we do not describe |
303 |
|
each command again. |
304 |
|
|
305 |
|
@section The Key Manager |
306 |
|
|
307 |
|
This part of the program is propably most important for many users. |
308 |
|
It contains function to manage your keyring and to perform actions |
309 |
|
which are required and/or useful in the OpenPGP environment. |
310 |
|
|
311 |
@subsection Adding a new secondary key |
@subsection Tips |
312 |
|
|
313 |
|
@itemize @bullet |
314 |
|
|
315 |
|
@item |
316 |
|
If you want to import quickly a key from a into the keyring, just |
317 |
|
drag and drop the file into the Key Manager window. Then the import |
318 |
|
procedure will be automatically started. |
319 |
|
|
320 |
|
@item |
321 |
|
Key which were fetched from keyservers often contain a lot of, |
322 |
|
maybe obsolete, self signatures, if you want to get rid of them |
323 |
|
you can use the Key Edit->Clean feature. Just start the edit |
324 |
|
dialog and select the clean command. That's it. |
325 |
|
|
326 |
|
@item |
327 |
|
The keyserver dialog does not allow to import a key directly |
328 |
|
via an URL, as an alternative you may use the "Import HTTP..." |
329 |
|
feature in the Key Manager. With it you can directly fetch keys |
330 |
|
from the web (Example: http://www.users.my-isp.de/~joe/gpg-keys.asc). |
331 |
|
|
332 |
|
@item |
333 |
|
To customize the parameters of the generated key, you can use |
334 |
|
the expert key generation. It allows you to set the public key |
335 |
|
algorithm and/or the size of the key directly. |
336 |
|
|
337 |
|
@item |
338 |
|
Most of the list view based dialogs allow to use the right |
339 |
|
mouse button, to show popup menus with available commands. |
340 |
|
|
341 |
|
@end itemize |
342 |
|
|
343 |
|
@subsection Create a Revocation Certificate |
344 |
|
|
345 |
|
It is very important to do this step early as possible. With this |
346 |
|
certificate, you can revoke your entire key. The reason for this |
347 |
|
can be for example, that your key is no longer used or even compromised. |
348 |
|
After you generated the revoc cert, you should move it to a secure place |
349 |
|
because anybody who gets access to it, can render your key unuseable. |
350 |
|
|
351 |
|
Just right-click on your key and select "Revoke Cert". If you do this |
352 |
|
step directly after key generation, there is no need to change the |
353 |
|
default values. Just select a file name and enter the passphrase. |
354 |
|
The program issues a warning which should be read carefully. |
355 |
|
|
356 |
|
@subsection Adding a new Secondary Key |
357 |
|
|
358 |
For most users the existing keys in the key pair are enough |
For most users the existing keys in the key pair are enough |
359 |
and no extra key is needed. But there are some exceptions. |
and no extra key is needed. But there are some exceptions. |
377 |
users it's a good idea to let the program chose the key size (in bits). |
users it's a good idea to let the program chose the key size (in bits). |
378 |
The default settings should be secure enough for most purposes. |
The default settings should be secure enough for most purposes. |
379 |
|
|
380 |
@subsection Adding a new user ID |
@subsection Adding a new User ID |
381 |
If you got a new email account, it's propably a good idea to |
If you got a new email account, it's propably a good idea to |
382 |
add these new account to your key also. For example: |
add these new account to your key also. For example: |
383 |
|
|
393 |
Now email programs are able to associate this address with your |
Now email programs are able to associate this address with your |
394 |
key when somebody wants to send you a protected mail to this account. |
key when somebody wants to send you a protected mail to this account. |
395 |
|
|
396 |
@subsection Adding a photographic ID |
@subsection Adding a new Photographic ID |
397 |
With this function you can add a photo to your public. It will be |
With this function you can add a photo to your public. It will be |
398 |
displayed in the key property dialog. |
displayed in the key property dialog. |
399 |
|
|
402 |
in the dialog carefully to make sure the photo has a proper size |
in the dialog carefully to make sure the photo has a proper size |
403 |
(file, height and weight). |
(file, height and weight). |
404 |
|
|
405 |
@subsection Adding a new designated revoker |
@subsection Adding a new Designated Revoker |
406 |
If you want to allow another key to revoke your own key, this |
If you want to allow another key to revoke your own key, this |
407 |
might be useful if you lost your secret or a simliar situation, |
might be useful if you lost your secret or a simliar situation, |
408 |
you can use this function to add a designated revoker to your key. |
you can use this function to add a designated revoker to your key. |
413 |
unuseable. You really should trust the selected key, in case it is |
unuseable. You really should trust the selected key, in case it is |
414 |
not a key owned by yourself. |
not a key owned by yourself. |
415 |
|
|
416 |
|
@subsection Export a Public Key |
417 |
|
There are several reason why to export a public key and there |
418 |
|
are also several ways to do it. If you want to send the key |
419 |
|
directly to a mail recipient, you can select the key, right-click, |
420 |
|
and select "Send Key to Mail Recipient". As an alternative, you |
421 |
|
can also export it to the clipboard or to a file. To export a |
422 |
|
key to the clipboard, you can select "Copy key to Clipboard" |
423 |
|
in the popup menu of the selected key. To export it to a file, |
424 |
|
you need to select the menu "Key" and then "Export...". The |
425 |
|
program will automatically suggest a name for the output. |
426 |
|
|
427 |
|
@subsection Import a Public Key |
428 |
|
Similar to the key import, the import of a key can be done in |
429 |
|
several ways. First, let's assume you got a mail with an OpenPGP |
430 |
|
key included as inline text. Then you can use the current window |
431 |
|
feature and "Decrypt/Verify" to import the key. Alternative you |
432 |
|
also may use the clipboard. To achieve this, you first need to |
433 |
|
select the entire key (CTRL+A) and then copy it to the clipboard |
434 |
|
(CTRL+C), then use the Key Manager (Edit->Paste) to import it. |
435 |
|
If the key is stored as an attachment, or you want to import |
436 |
|
a key from a file in general, just drag the file and drop it |
437 |
|
into the Key Manager window or use "Key" -> "Import...". |
438 |
|
|
439 |
|
@subsection Sign a Public Key |
440 |
|
If you verified that a key really belongs to its owner, you |
441 |
|
should sign the key to integrate it into your Web of Trust |
442 |
|
and also to mark the key as valid in your keyring. Do not sign |
443 |
|
a key you just got via email with the request to sign it. Anybody |
444 |
|
can create a key with your (or better ANY) name, these information |
445 |
|
are no hint to whom the key really belongs. You can check a key |
446 |
|
by meeting or calling the key owner and verify the key fingerprint |
447 |
|
of the key with the one published by the key owner. Additional checks |
448 |
|
should be to watch at his driver license or the identity card to make |
449 |
|
sure that name of the key matches the name of the key owner. After |
450 |
|
this procedure is done, you can open the Key Manager, select the |
451 |
|
right key and either use the context menu "Sign Key" or use the |
452 |
|
toolbar button. |
453 |
|
|
454 |
|
The next dialog will summarize the key information and some |
455 |
|
additional options. For example if the signature should be |
456 |
|
local or exportable. Local means the signature will be stripped |
457 |
|
if you export the key and no one else except you can use it to |
458 |
|
calculate the validity. If you mark the signature exportable, |
459 |
|
any other user can see and use it. Now you can select the key |
460 |
|
you want to use to sign and enter the passphrase. Confirm with "OK" |
461 |
|
and the key will be signed. Now the validity of the new key is |
462 |
|
"Full". It is propably a good idea to set the ownertrust of the |
463 |
|
key. For a detailled description, see the chapter "Key Ownertrust". |
464 |
|
|
465 |
|
@subsection Key Ownertrust |
466 |
|
First we should explain what the ownertrust of a key is. The ownertrust |
467 |
|
is a measurement how much you trust somebody to certify and check keys |
468 |
|
of other people. For example, if you know that Bob is really the owner |
469 |
|
of the key, you should sign it. But he is also known to sign other keys |
470 |
|
without checking the idenity of the other key owner. Values for the |
471 |
|
ownertrust are 1) Don't Know 2) Don't Trust 3) Marginal 4) Full |
472 |
|
and thus you should propably use an ownertrust value like "Marginal". |
473 |
|
But this is a personal decision and stored in a separate file and |
474 |
|
never exported with the public keys. For further information, please |
475 |
|
take a look into the GNU Privacy Handbook. |
476 |
|
Just a last work on Key Pairs, they are automatically marked as |
477 |
|
"Ultimate" because the key belongs to you and you trust it implicit. |
478 |
|
|
479 |
|
@section The File Manager |
480 |
|
|
481 |
|
@subsection Introduction |
482 |
|
The File Manager is no replacement for an Explorer Extension. |
483 |
|
If you secure your files frequently and you want to do this |
484 |
|
fast and easy, I suggest to install GPGee. It is a program |
485 |
|
which integrates itself into the explorer and provide menu |
486 |
|
entries in the context menu of files and directory. But the |
487 |
|
File Manager can be very useful if you just want to decrypt |
488 |
|
and/or encrypt some files without additional programs. You |
489 |
|
can find the File Manager via the symbol in the taskbar, |
490 |
|
right click and then "File Manager". |
491 |
|
|
492 |
|
@subsection An Overview of the GUI |
493 |
|
First there are different ways to add (open) files in the |
494 |
|
Key Manager. The easiest way is to use drag and drop to |
495 |
|
add files into the File Manager. Just drag a file from the |
496 |
|
explorer and drop it into the File Manager window. The second |
497 |
|
way is to use File->Open. A dialog opens which is common for |
498 |
|
all "File Open" operations in most Windows application. Now |
499 |
|
you can select one or more files and confirm. The files will |
500 |
|
be automatically added to the File Manager window. The main |
501 |
|
window consists of a listview with three rows. |
502 |
|
|
503 |
|
The first row is the status of the file. It can be "ENCRYPTED", |
504 |
|
"SIGNED", "PUBKEY", "SECKEY", "SIG" or "UNKNOWN". Dependent on |
505 |
|
the file status, the File Manager offers different choices. For example |
506 |
|
"SIG" enables the verify options in the (popup) menu. "UNKNOWN" is |
507 |
|
the default for all plaintext files. |
508 |
|
The second row is the file name. And the last row is the status of |
509 |
|
the operation. It can be either "", "SUCCESS" or "FAILED". An empty status |
510 |
|
means no operation was started yet. FAILED indicates that the |
511 |
|
GnuPG operation failed. In this case an error message was issued before. |
512 |
|
|
513 |
|
Now it follows an example: |
514 |
|
We assume that user wants to encrypt "c:\My Ideas\GPG GUI.txt". |
515 |
|
Drag the file from the Explorer and drop it into the open File |
516 |
|
Manager, the main window. The file will be added and recognized |
517 |
|
as "UNKNOWN". Now we select the file and right click, a popup |
518 |
|
menu is shown and we select "Encrypt". An new dialog is opened |
519 |
|
which looks similar to the Clipboard Encryption dialog. Just |
520 |
|
select the recipients and confirm. In contrast to clipboard encryption, |
521 |
|
file encryption offers some more extra options. They are described |
522 |
|
later. And hour glass will be shown as long as GnuPG takes to encrypt |
523 |
|
the file. When the procedure is done, the third row should be change |
524 |
|
to "SUCCESS" and the first row to "ENCRYPTED". |
525 |
|
|
526 |
|
@subsection General Options |
527 |
|
Now we describe the general options which are possible in some |
528 |
|
File Manager dialogs. |
529 |
|
|
530 |
|
@itemize |
531 |
|
|
532 |
|
@item Text Output |
533 |
|
When this option is checked, the output will be encoded in ASCII armor. |
534 |
|
This can be useful if the file should be transfered via email. The |
535 |
|
size of the output file is larger than the usual binary output. |
536 |
|
|
537 |
|
@item Wipe Original |
538 |
|
If this option is checked, the original file will be deleted after |
539 |
|
successfull encryption. This can be useful if data should not be |
540 |
|
available in plaintext any longer on a machine. |
541 |
|
|
542 |
|
@end itemize |
543 |
|
|
544 |
@bye |
@bye |