1141
Newbie discussion / Re: What Operating Systems Do You Use?
« on: June 05, 2013, 06:20 pm »That is good thinking.
Do you know a way to prevent PGP from leaking what OS yo uuse?
Yep, you can remove the Version line by adding no-emit-version to your gpg.conf.
For the sake of everyone's sanity, use a PGP program that is based on a recent port of GnuPG.
Windows: GPG4USB, GPG4Win
OS X: GPGTools
Linux: GPG itself (the original)
Then find where your gpg.conf (configuration file) is, and replace everything in it with this:
Code: [Select]
no-emit-version # remove the version line
no-comments # remove comment lines
armor # ASCII armor all output, so it can be posted to email, forums
trust-model always # suppress warnings about untrusted, unsigned keys
## Some lists of ciphers in order of preference
personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 CAST5 3DES BLOWFISH
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1
personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
cert-digest-algo SHA512
## Optional
## Remove the # at the beginning of these lines to use them
#default-key <keyID> # if you have multiple keys, this sets a default key to use
#encrypt-to <keyID> # automatically encrypt everything to this key
#throw-keyid # anonymize the recipients of a message by zeroing out the key IDs
#hidden-encrypt-to <keyID> # automatically encrypt to a key and anonymize it
## You generally shouldn't use key servers, but if you want to connect to them over
## Tor, install an HTTP proxy like Privoxy and use these options. Privoxy uses port 8118
## by default, but you can change that to whatever your HTTP proxy uses
keyserver hkp://2eghzlv2wwcq7u7y.onion
keyserver-options http-proxy=http://127.0.0.1:8118,debug,verbose