Quote from: drjaycsmith on September 04, 2013, 11:57 amIf you use GPG4USB, you can encrypt to 4,096 bits. Not all PGP software is equal, nor is it compatible. Usually when someone is having trouble encrypting to a vendor, it's because one of them is using a shitty PGP program and they won't talk to each other. Can't encrypt? Try a different program.You can't decrypt messages without the private key and password. When you create a new key, you keep the private half stashed away--it tells your keyring that the key belongs to you--and then you use your password to decrypt.Try GPG4USB. It's tight on security, easy to use, more-or-less universal, and it has a great interface.Good luck on the computer. And yeah, if the DEA had a whole pocketful of fucks, they wouldn't give one to either of us.--Dr. JayPardon me, Dr. -- I know we've had a few spotty exchanges and don't mean to be rude -- but I have to correct you here: you do not use your password to decrypt messages. You use the actual private key data, which is kept in a format that's encrypted using your passphrase. So your passphrase decrypts the private key, and the private key decrypts the message. Unfortunately the passphrase encryption because of it's design is the weakest part, and someone who knows what they're doing and has the resources can pretty easily recover the private key if they get their hands on it even without your passphrase. BTW, I only say by design because of the system design; to my knowledge nobody knows of a better one. It isn't because they deliberately made it weak or anything.To be truly technical, with gpg (which gpg4usb uses to do all the lifting, BTW) it's a little more complex than that, but those details aren't really important (and I don't even remember them all, frankly).