1 00:00:00,900 --> 00:00:06,380 Now so far we have David who wants to send a secret message to John to do this. 2 00:00:06,390 --> 00:00:08,910 John generated a keeper. 3 00:00:08,970 --> 00:00:12,570 John also sent the public key to David. 4 00:00:12,570 --> 00:00:18,050 David has downloaded the public key and imported it into his key ring. 5 00:00:18,060 --> 00:00:23,770 So if we go to David's computer right here we can see he has John's public key. 6 00:00:24,360 --> 00:00:30,870 So right now David can encrypt data with John's public key send it to John. 7 00:00:30,870 --> 00:00:37,740 And that way John will be the only person who can decrypt this data because he is the only person that 8 00:00:37,740 --> 00:00:39,630 has his own private key. 9 00:00:40,680 --> 00:00:44,060 Now you'll also notice an extra entry in here. 10 00:00:44,190 --> 00:00:50,620 I've actually created a keeper for David in this section right here for the sake of completion. 11 00:00:50,640 --> 00:00:56,620 You don't have to do this because like I said all we need is John's public key to send data to John. 12 00:00:56,700 --> 00:01:03,150 And according to the example we're doing David will be sending data to John so all we need is John's 13 00:01:03,150 --> 00:01:04,800 public key. 14 00:01:04,950 --> 00:01:11,130 I just created a keeper here for David just for the sake of completion so that you can see how this 15 00:01:11,130 --> 00:01:13,980 will work in a real life scenario. 16 00:01:13,980 --> 00:01:19,220 So we actually don't need to use this anymore because David already has the public key of John. 17 00:01:19,710 --> 00:01:26,030 So all you have to do is literally start typing the message that you want to send to do this. 18 00:01:26,040 --> 00:01:28,240 I'm just going to open a text editor. 19 00:01:28,380 --> 00:01:30,700 So again we're gonna go to accessories. 20 00:01:30,840 --> 00:01:35,390 We're going to open my text editor and I'm just going to start composing the message. 21 00:01:35,970 --> 00:01:38,700 So for this we're just gonna say hello. 22 00:01:38,700 --> 00:01:44,130 This is a secret message sent from David to John. 23 00:01:45,360 --> 00:01:49,420 Now before sending this we're going to select all of this text. 24 00:01:49,590 --> 00:01:50,830 We're going to copy it. 25 00:01:52,050 --> 00:01:59,220 And then we're gonna go to the clipboard applet and we're going to click on sign encrypt clipboard with 26 00:01:59,220 --> 00:02:01,020 public key. 27 00:02:01,020 --> 00:02:02,860 We're going to click on this. 28 00:02:03,180 --> 00:02:09,480 And as you can see you get a list of all of the public key that you have on your computer. 29 00:02:09,570 --> 00:02:16,890 Now like I said all of the ones that start with tails are default public keys added in order to verify 30 00:02:16,890 --> 00:02:22,250 the integrity of packages downloaded from tells you don't want to select any of these. 31 00:02:22,320 --> 00:02:26,600 You want to make sure you select the contacts that you want to send their message to. 32 00:02:26,640 --> 00:02:33,190 And in our example we want to send the message to John Wick now this is perfectly fine. 33 00:02:33,200 --> 00:02:38,230 You can just select it like this and click on okay to encrypt the message. 34 00:02:38,330 --> 00:02:42,290 But in this case even you even David. 35 00:02:42,290 --> 00:02:48,920 So even the sender won't be able to see the contents of the message if you want to be able to decrypt 36 00:02:48,920 --> 00:02:55,730 the contents of the message yourself as well then you should take the entry for your own key. 37 00:02:55,730 --> 00:02:57,530 So this is David's computer. 38 00:02:57,560 --> 00:03:03,500 And if David wants to still be able to see the contents of the message that he is going to send he should 39 00:03:03,500 --> 00:03:05,150 take this box. 40 00:03:05,150 --> 00:03:07,300 Otherwise we can just tick John. 41 00:03:07,460 --> 00:03:13,340 And the only person in the world that will be able to read the content of this message will be John 42 00:03:13,610 --> 00:03:15,710 or anyone who has the private key. 43 00:03:15,740 --> 00:03:21,230 But if John is using BGP properly he should never share the private key with anybody. 44 00:03:21,260 --> 00:03:27,950 And therefore when we encrypt a message with his private key we can be sure that John will be the only 45 00:03:27,950 --> 00:03:31,610 person that can read the content of this message. 46 00:03:31,610 --> 00:03:33,530 So we're going to click on. 47 00:03:33,530 --> 00:03:34,920 OK. 48 00:03:35,120 --> 00:03:40,510 That's going to ask us if we trust this key we're going to say yes we do trust it. 49 00:03:40,610 --> 00:03:48,170 And as you can see in here you can see the icon of the clipboard has changed to indicate that the clipboard 50 00:03:48,170 --> 00:03:55,360 right now contains an encrypted text that represents the text that we copied already. 51 00:03:55,400 --> 00:04:02,750 So if and the same text editor in here if I just paste whatever that is in my clipboard you will see 52 00:04:02,840 --> 00:04:04,980 I'll get an encrypted message. 53 00:04:05,090 --> 00:04:11,730 And this is basically the content in here encrypted using John's public key. 54 00:04:12,770 --> 00:04:21,830 So right now you can't just copy all of this and send it to John using any method of communication so 55 00:04:21,830 --> 00:04:24,120 you can send it as an instant message. 56 00:04:24,200 --> 00:04:28,190 You can send it in a chatroom you can send it as an e-mail. 57 00:04:28,280 --> 00:04:34,160 You can even put it in a pastebin publicly where anybody can see your message where anybody can see 58 00:04:34,160 --> 00:04:35,570 your secret message. 59 00:04:35,570 --> 00:04:37,550 This is the beauty of PDP. 60 00:04:37,610 --> 00:04:44,450 You can put this anywhere and nobody will be able to see or read the content of this unless they have 61 00:04:44,450 --> 00:04:46,090 the private key of John. 62 00:04:46,100 --> 00:04:52,670 And like I said if John is using PDP properly and he knows what he is doing he should never share his 63 00:04:52,670 --> 00:04:53,670 private key. 64 00:04:53,690 --> 00:05:00,450 Therefore he will be the only person in the world that is able to read the content of this message. 65 00:05:00,620 --> 00:05:02,980 Now for this example to make things easy. 66 00:05:03,140 --> 00:05:12,220 I'm going to go back to my e-mail client and I'm just going to reply to this email and we'll put our 67 00:05:12,220 --> 00:05:14,010 encrypted message in here. 68 00:05:14,020 --> 00:05:18,010 Keep in mind I'm copying it from the start to the end. 69 00:05:18,010 --> 00:05:22,510 I'm going to click on send and that's it sent to John. 70 00:05:22,600 --> 00:05:26,000 So let's go to John's computer. 71 00:05:26,050 --> 00:05:28,590 We're going to go to his e-mail account. 72 00:05:28,600 --> 00:05:33,760 We're going to refresh the inbox and we're going to click on the message that we just got. 73 00:05:34,810 --> 00:05:37,930 And as you can see this message is encrypted. 74 00:05:37,930 --> 00:05:39,100 It's gibberish. 75 00:05:39,100 --> 00:05:47,050 We can't really see what David is trying to tell us so we're going to right click and copy this message 76 00:05:47,500 --> 00:05:51,740 and as soon as we copy it you'll notice the clipboard icon in here. 77 00:05:51,760 --> 00:05:59,140 Again changes to indicate a lock to indicate that the clipboard contains encrypted text. 78 00:05:59,140 --> 00:06:05,600 We're going to click on this and we're going to say I want to decrypt or verify my clipboard. 79 00:06:06,020 --> 00:06:11,770 That's going to ask me for the passphrase for my key for John Wicks key. 80 00:06:11,920 --> 00:06:19,150 Remember when we created this key we had to select a passphrase and that passphrase will always be required 81 00:06:19,360 --> 00:06:22,000 before you can use this private key. 82 00:06:22,030 --> 00:06:28,950 So I'm going to put the passphrase that I set when I created this key I'm going to click on. 83 00:06:28,980 --> 00:06:36,480 OK and perfect as you can see we can see the contents of the message saying hello. 84 00:06:36,480 --> 00:06:41,610 This is a secret message sent from David to John. 85 00:06:41,610 --> 00:06:43,000 So that's pretty much it. 86 00:06:43,140 --> 00:06:48,930 As you can see the receiver shares their public key with the sender the sender uses this public key 87 00:06:48,930 --> 00:06:54,110 to encrypt the message and then they can put the message anywhere or even share it publicly. 88 00:06:54,120 --> 00:06:59,220 It doesn't really matter because the only person that can read this message is the person who has the 89 00:06:59,220 --> 00:07:07,590 private key the private key never gets shared therefore this is a very very good and secure implementation. 90 00:07:07,620 --> 00:07:11,550 So now in this example John created the keeper. 91 00:07:11,550 --> 00:07:13,850 He shared his public key with David. 92 00:07:13,950 --> 00:07:18,940 And David was the one encrypting the message and sending it back to John. 93 00:07:18,960 --> 00:07:25,350 Now if John wants to send something back to David we just have to do the reverse of the process. 94 00:07:25,350 --> 00:07:30,410 So David will just have to create his own keeper share the public key with John. 95 00:07:30,480 --> 00:07:36,840 And then John will be able to encrypt messages and share them with David and know that David would be 96 00:07:36,840 --> 00:07:41,840 the only one able to read the contents of the messages sent to him.