Skip to content
Pico y Pala – Bitcoins, Ethereum, Ripple,…

Bitcoin Safety: Trustless Personal Messaging With Public And Personal Key Cryptography


Message privateness, more and more essential to Bitcoiners, will be achieved with private and non-private key cryptography.

As a Bitcoiner, you’re going to want a safe technique to talk privately, with out counting on an organization to encrypt your information for you. For instance, freely obtainable strategies with end-to-end encryption like Telegram (not with its default choice) and Sign and others are simple to make use of, however I don’t utterly belief them.

This text will present you methods to ship messages utilizing free open-source software program, GNU Privateness Guard (gpg), which permits encryption and decryption utilizing private and non-private key cryptography. It’s extra difficult at first to DIY, however when you get the grasp of it, it’s not that onerous. I’ll take you thru it step-by-step, simply comply with alongside and bookmark this text for future reference.

This is a bit more background about gpg (together with pgp) for individuals who want to dig deeper. It’s of curiosity to notice that private and non-private key cryptography is just not solely used for encryption and decryption, but additionally used for the verification of digital signatures — utilized in Bitcoin transactions and in addition information generally (e.g., checking if the software program you downloaded is real and never tampered with, as proven within the first video right here).

How It Works

To make a private and non-private key pair, your laptop generates a really massive (“unguessable”) random quantity from which the gpg software program will create for us a non-public key, and from that, a public secret’s created (similar to Bitcoin personal keys, extra data right here).

The general public secret’s shared with the world (like a Bitcoin handle) and incorporates your ID (e mail and identify) which you publish on-line. Right here is mine. Consider the general public key like an open secure. Anybody can write a message and encrypt that message along with your PUBLIC key (i.e., put it in your secure and lock the door shut) — solely you will have the personal key and, subsequently, solely you may open your secure (i.e., decrypt and browse the message).

A facet notice: Don’t fear about this for now — simply notice that, in Bitcoin, there isn’t any “encryption” happening with funds. As an alternative, there are “signatures” made with personal keys, which will be “verified” by anybody utilizing public keys.


On this information, I’ll take you thru the next steps:

  1. Obtain gpg.
  2. Make your personal personal and public key.
  3. Retailer your personal key to a USB drive.
  4. Add your personal key to your different laptop’s’ keychain.
  5. Add your PUBLIC key to a keyserver and/or your web site.
  6. Add your public key’s fingerprint to your on-line profile, e.g., Twitter or Keybase.
  7. Ship me a message encrypted with my public key, and I’ll reply encrypting along with your public key.

Obtain GPG

The very first thing you’ll have to do is obtain the gpg software program.


In the event you’re utilizing Linux, gpg ought to already be put in. If not, you may set up it with the command:

sudo apt-get set up gnupg

In the event you simply need to test if it’s put in, sort this:

gpg –version

HINT: In the event you’re working a Bitcoin Node on a Raspberry Pi, you may truly use SSH to entry your Pi’s terminal and run gpg instructions like that. If what I mentioned is unnecessary, don’t fear, ignore it, it’s outdoors the scope of this text.


In case you have a Mac, you’ll have to obtain and set up “GPG Suite” — it’s free until you additionally need the e-mail instruments (no want). This will provide you with the command line instruments you want.

Home windows

Obtain and set up “Gpg4Win.” It’s free. There’s a donation web page earlier than downloading, you may choose $0 to proceed.

When putting in, you may uncheck all of the bins besides the primary.

Make Your Personal Personal and Public Key

Open the terminal in Mac or Linux or command immediate in Home windows.


gpg –full-generate-key

Select the default RSA choice.

Then select the dimensions of your key. Larger is safer.

Then choose how lengthy the important thing ought to be legitimate. I choose to not let the important thing expire.

You then’ll fill out some private particulars. This might be made public so individuals know who the general public key belongs to. The information truly will get embedded into the important thing. Select “O” for “Okay” to proceed.

Then lock your personal key with a “passphrase.”

I used to be suggested to maneuver the mouse round or sort on the keyboard throughout key creation so as to add some additional randomness to the important thing. These are the main points of the important thing I created (on the backside).

Retailer Your Public Key To A USB Drive

The pc you used to create the personal key has the important thing in its “keychain,” and it’s locked with a passphrase. The keychain is simply an summary idea — the important thing(s) are literally simply saved in a file someplace.

I recommend you backup your personal key to a USB thumb drive. This lets you copy it to a special laptop if wanted and reduces the danger of loss.

To try this, we first need to export it from the keychain and put it right into a file.

Begin by getting the important thing’s ID:

gpg –list-keys

This exhibits you all of the keys (private and non-private) in your laptop’s keychain.

Copy the important thing ID to the clipboard. Mine is:


Then we export the general public keys to a file, and we have to put the important thing ID within the command (that’s why we copied it to the clipboard).

The above command makes use of gpg and has some choices.

The “–output” choice specifies that the output ought to go to a file, offered straight after.

I selected “public.gpg” ias the identify of the file, and it will likely be created because the command is executed.

“–armor” specifies the output ought to be in ASCII-armored format and “–export” specifies which key from the keychain ought to be exported, offered straight after.

If you wish to see the contents of the file, simply use the “much less” command (‘q’ exits the ‘much less’ perform):

much less public.gpg

Subsequent, let’s export the personal key. The command is just like the one earlier than with some changes. Change the file identify to one thing like “personal.gpg” and alter the “–export” choice to “–export-secret-key.”

We now have “public.gpg” and “personal.gpg” information within the present listing. Copy them to a USB drive and preserve them secure and hidden. It’s not as delicate as a Bitcoin personal key, however the loss or theft of the “personal.gpg” file would enable somebody to impersonate you. In case your passphrase is robust, it’s unlikely an attacker will be capable of use your personal key even when they received their grubby fingers on it.

Add Your Keys To Your Different Pc’s Keychain

Take your USB drive along with your personal key to your different laptop. Be sure that gpg is put in. Open a terminal and navigate to the situation of your file. Enter the command:

gpg –import personal.gpg

Bear in mind “personal.gpg” is a file identify, so substitute that along with your file’s identify, don’t simply blindly copy the command with out considering. You can be requested to enter the passphrase, after which the personal and public keys might be imported in a single go.

To delete the personal key, the command is:

gpg –delete-secret-keys KEY_ID

Substitute KEY_ID for the important thing ID or e mail of your key.

Add Your PUBLIC Key To A Keyserver And/Or Your Web site

There are a number of well-liked keyservers in use all over the world. The foremost keyservers synchronize themselves similar to Bitcoin nodes do, so it’s wonderful to choose a keyserver near you on the web after which use it commonly for sending and receiving keys (PUBLIC keys, in fact).

gpg –keyserver –send-key D7200D35FF3BEDFDAB6E0C996565B2E40BC9A48F

The above command is on one line. There’s a area after “–send-key” which will not be apparent because the formatting in your browser could break the road into two.

“–keyserver” is an choice that expects the online handle of a keyserver subsequent.

“–send-key” is an choice that expects a Key_ID.

If you wish to import a public key of another person immediately from a keyserver, enter the above command however change “–send-key” to “recv-key,” and use his or her Key_ID.

Add Your Public Key’s Fingerprint To Your Twitter/Keybase

What’s the purpose of this? In the event you show a brief model of your public key in varied locations, somebody sending you a message will be extra sure that they’re downloading the right public key.

You’ll be able to see your key’s fingerprint with this command:

gpg –fingerprint KEY_email

With most of those instructions, typically an e mail will work, typically it wants the precise KEY_ID. You’ll be able to all the time see what your KEY_ID is with:

gpg –list-keys

When you see your fingerprint, copy it and paste it into your on-line profiles as I’ve completed on Twitter.

Whenever you obtain my public key, the fingerprint might be displayed after you import it, or when you use the “–list-keys” command, or “gpg –fingerprint Key_ID”.

You’ll be able to then test the output with my on-line profile to be sure to have the right key.

Ship Me A Message Encrypted With My Public Key, And I Will Reply Encrypting With Your Public Key

First, you’ll have to get my public key. You’ll be able to browse to, and enter my e mail into the search area.

Or you may go to my contacts/gpg web page and comply with directions there. Copy my Key_ID to the clipboard.

Open a terminal and enter this command:

gpg –keyserver –recv-keys e7c061d4c5e5bc98

You now have my public key imported to your laptop’s keychain.

Now you may sort a letter to me in a textual content file (letter.txt) or Phrase doc (something, actually) and put it aside to disk. In a terminal, navigate to the place you saved the file. Then sort this command:

gpg –output letter.gpg –encrypt –recipient [email protected] letter.txt

Right here you’ve received a command which might be all on one line. The “–output” choice allows you to create a filename typed instantly afterward, the place the encrypted information will go.

The “–encrypt” choice is an instruction to encrypt.

The “–recipient” choice lets you select which public key in your keychain to make use of to encrypt the message. Instantly afterward, when you sort in an e mail handle, it is going to select the fitting key out of your keychain.

Lastly, following the e-mail or Key_ID, you place the identify of the file you need to encrypt.

You may get some warnings and affirmation messages, however after that, it’s best to have a brand new file referred to as “letter.gpg” or no matter filename you selected. The unique file nonetheless exists (“letter.txt”). You’ll be able to delete that file with (utilizing Linux or Mac):

rm letter.txt

You may as well clear the historical past of the command immediate with:

historical past -c

You’ll be able to then ship an e mail and connect “letter.gpg” and ship it to me. Once I obtain it, I’ll obtain it to disk first, then use this command to decrypt the file:

gpg –output decrypted_message.txt –decrypt letter.gpg

This can create a brand new file “decrypted_message.txt” utilizing the encrypted information from “letter.gpg.” The pc can learn which public key encrypted the info (so I don’t have to specify a Key_ID), and it could actually see it has the personal key to that public key within the keyring, so it could actually use it to decrypt the message.


I’ve proven you the steps to create a non-public and public key for your self, encrypt a message with my public key, and ship me the message which I’ll decrypt with my personal key.

In the event you ship me your public key, or directions to get it, I can encrypt a message and ship you a message when you like.

Give it a go!

It is a visitor publish by Arman the Parman. Opinions expressed are fully their very own and don’t essentially replicate these of BTC Inc or Bitcoin Journal.