1 00:00:01,300 --> 00:00:08,710 Now that we have our keeper generated the next step is to share our public key with the people that 2 00:00:08,710 --> 00:00:16,660 we want to receive encrypted messages from so that they can encrypt messages using our public key so 3 00:00:16,660 --> 00:00:24,010 that we will be the only people that can decrypt these messages because we have the private key. 4 00:00:24,010 --> 00:00:28,210 So in order to do this you need to come to your passwords and keys. 5 00:00:28,210 --> 00:00:35,410 Like I said you can access this from applications utilities and click on passwords and keys as you can 6 00:00:35,410 --> 00:00:42,730 see I have it already opened and I already selected my key pair which I created in the previous lecture. 7 00:00:42,730 --> 00:00:45,340 Now in order to export the public key. 8 00:00:45,340 --> 00:00:49,630 Now keep in mind we're exporting the public key not the private key. 9 00:00:49,690 --> 00:00:51,730 We never shared the private key. 10 00:00:51,820 --> 00:00:53,910 Hence the name private key. 11 00:00:53,980 --> 00:00:56,110 So we're gonna go to file. 12 00:00:56,110 --> 00:01:02,860 We're going to click on export and you need to select the location where you want to store your public 13 00:01:02,860 --> 00:01:03,370 key. 14 00:01:03,380 --> 00:01:10,390 And now I'm going to select my tour browser directory because I want to share this through email. 15 00:01:10,390 --> 00:01:16,600 So when added as an attachment and as we know the Tor browser can only access the third browser directory 16 00:01:16,600 --> 00:01:17,510 entails. 17 00:01:17,560 --> 00:01:19,700 That's why I selected this directory. 18 00:01:19,720 --> 00:01:23,050 What you can store it anywhere you want. 19 00:01:23,050 --> 00:01:27,970 Now I'm also going to change the format from PDP to armored PDP. 20 00:01:28,120 --> 00:01:30,410 This won't really make a big difference. 21 00:01:30,430 --> 00:01:36,350 The reason why I'm doing this so that I can show you the content of the key as plain text. 22 00:01:36,520 --> 00:01:37,840 So we're done here. 23 00:01:37,840 --> 00:01:41,460 I'm going to click on export and that's it. 24 00:01:41,480 --> 00:01:42,030 It's done. 25 00:01:42,680 --> 00:01:52,170 So if I go to my home directory and go to Tor browser you can see we have a file called John Wick that 26 00:01:52,230 --> 00:01:59,910 A C and this is my public key that I can share with anybody so that they can encrypt data and send it 27 00:01:59,910 --> 00:02:01,440 to me. 28 00:02:01,440 --> 00:02:04,820 Now you can literally attach this file the way it is. 29 00:02:04,860 --> 00:02:09,600 You can upload it to a file sharing service like I showed you or use on your own share. 30 00:02:09,600 --> 00:02:15,160 You can use any method of sharing this file if you don't want to share it as a file. 31 00:02:15,180 --> 00:02:23,670 You can also right click it select open with other application select view all applications and select 32 00:02:23,670 --> 00:02:26,490 your text editor to open it with a text editor. 33 00:02:27,150 --> 00:02:33,570 If I click on select here you'll see we'll be able to read the file as normal text. 34 00:02:33,750 --> 00:02:40,320 And this way you can literally copy all of this and paste it anywhere you want. 35 00:02:40,320 --> 00:02:46,260 So like this you can share the key without having to upload the file or attach it anywhere. 36 00:02:46,290 --> 00:02:52,730 You can copy this text send it as an instant message printed on a piece of paper and give it to someone. 37 00:02:52,830 --> 00:02:54,630 You can do anything you want with it. 38 00:02:54,990 --> 00:02:56,540 So you have two ways of sharing it. 39 00:02:56,550 --> 00:03:02,850 You can literally copy this text and send it to the person that you want to receive encrypted data from 40 00:03:03,330 --> 00:03:06,420 or you can attach this file right here. 41 00:03:06,660 --> 00:03:09,960 And like I said you can use any method of communication. 42 00:03:10,020 --> 00:03:17,120 It doesn't really matter how you send it now just as an example I'm going to be sending this as an email. 43 00:03:17,260 --> 00:03:22,230 So I've already logged in into my web mail as you can see in here. 44 00:03:22,390 --> 00:03:24,830 And what I want to do is send a message. 45 00:03:24,850 --> 00:03:27,880 So I'm going to click on compose. 46 00:03:27,880 --> 00:03:33,460 I'm going to put the e-mail of the person I want to send this to so I'm sending this to another e-mail 47 00:03:33,460 --> 00:03:41,710 account that I own for David Smith at elude dot and I'm going to set the subject and I'm going to call 48 00:03:41,740 --> 00:03:50,620 this my p GP key and then you can write anything here if you wanted the message. 49 00:03:50,620 --> 00:03:58,670 So we're going to say please find my PDP key below you can literally just paste all of the text that 50 00:03:58,670 --> 00:04:05,780 you copied in here like I said and then they'll be able to use this key as text to encrypt data to you 51 00:04:05,960 --> 00:04:08,720 and we'll see how you can do that. 52 00:04:08,750 --> 00:04:11,460 This is the first method of sharing your key. 53 00:04:11,480 --> 00:04:16,740 Like I said You can also share the key file that we exported to do that. 54 00:04:16,790 --> 00:04:18,230 We're going to use an attachment. 55 00:04:18,230 --> 00:04:23,990 So again I'm going to click on browse and select the key file that we have in here or already in the 56 00:04:23,990 --> 00:04:25,670 Tor Browser directory. 57 00:04:25,670 --> 00:04:29,570 So you just double click this and that's added to the attachment. 58 00:04:29,570 --> 00:04:32,350 Now like I said You don't need to send both. 59 00:04:32,360 --> 00:04:34,940 I'm just showing you both here as an example. 60 00:04:34,940 --> 00:04:42,350 What on this end in the key as a file or as text in here is enough for the other person to start encrypting 61 00:04:42,350 --> 00:04:44,060 data for you. 62 00:04:44,090 --> 00:04:48,500 Not only that but you can even add this key to your signature. 63 00:04:48,500 --> 00:04:54,920 So every time you communicate with someone they will see your public key and if they wanted to they 64 00:04:54,920 --> 00:04:58,760 can encrypted data that they're sending to you using your public key. 65 00:04:58,820 --> 00:05:06,560 And this way nobody can read this data except you a lot of people even put this in their profile page 66 00:05:06,620 --> 00:05:09,140 and forums and even and markets. 67 00:05:09,140 --> 00:05:15,680 So if you click on a certain account you'll probably see their GP key pasted like this so that when 68 00:05:15,680 --> 00:05:19,940 you communicate with them you would use this key to encrypted data. 69 00:05:19,940 --> 00:05:26,660 And that way they will be the only people able to read the message because you encrypted it using their 70 00:05:26,660 --> 00:05:27,800 public key. 71 00:05:27,800 --> 00:05:34,160 So the whole idea is you want to share this with anybody that might want to communicate with you so 72 00:05:34,160 --> 00:05:40,810 that when they send you something you will be the only person able to read what they sent you. 73 00:05:40,820 --> 00:05:43,420 So we have the key here we have it attached. 74 00:05:43,460 --> 00:05:45,570 We've already said the e-mail on the subject. 75 00:05:45,680 --> 00:05:54,170 So I'm just going to click on send to send this email and I'm going to go to the other computer. 76 00:05:54,170 --> 00:05:55,740 This is David's computer. 77 00:05:55,760 --> 00:06:01,790 The person that is supposed to send messages to John as you can see I'm already logged into the email 78 00:06:01,790 --> 00:06:03,050 account as well. 79 00:06:03,080 --> 00:06:07,090 I'm going to refresh to see if I got anything in my inbox. 80 00:06:07,310 --> 00:06:12,510 And as you can see I have a new message we're going to go to the inbox. 81 00:06:12,520 --> 00:06:14,560 This message is coming from John Wick. 82 00:06:14,590 --> 00:06:15,160 Perfect. 83 00:06:15,160 --> 00:06:23,660 So we're going to click on it again as you can see we have the key in both forums as an attachment and 84 00:06:23,690 --> 00:06:24,490 as text. 85 00:06:25,220 --> 00:06:27,110 So now this is David. 86 00:06:27,110 --> 00:06:33,980 And if we go back to our diagram David is the person that wants to send an encrypted message to John. 87 00:06:34,010 --> 00:06:37,400 So what John did is he created a key. 88 00:06:37,430 --> 00:06:39,680 He sent John the key pair. 89 00:06:39,710 --> 00:06:41,970 So we have the key right here. 90 00:06:42,050 --> 00:06:47,960 What we need to do right now is download the key and in the next lecture I'll show you how we use it 91 00:06:48,140 --> 00:06:49,880 to encrypt the message. 92 00:06:50,000 --> 00:06:52,940 So let's go ahead and download the key. 93 00:06:53,030 --> 00:06:55,460 So we have it in here as an attachment. 94 00:06:55,490 --> 00:06:58,030 All we have to do is click on Download. 95 00:06:58,310 --> 00:07:04,550 And as usual if you click on Save This will only allow you to save it in the third browser directory. 96 00:07:04,550 --> 00:07:06,900 And it's called John week at a. 97 00:07:07,130 --> 00:07:16,620 So I'm going to click on safe to see with their and if we go to our home directory go to Tor browser 98 00:07:17,370 --> 00:07:21,090 you will see we have the key saved right here. 99 00:07:21,090 --> 00:07:27,060 Now I'm actually going to remove this because I also want to show you how to download the key if it 100 00:07:27,060 --> 00:07:31,410 was sent as plain text if it was not sent as an attachment. 101 00:07:31,440 --> 00:07:34,710 So we're going to assume that you just got the key like this as text. 102 00:07:35,130 --> 00:07:40,830 So if you want to save a key that you got it like this for example if you've got it as an instant message 103 00:07:41,100 --> 00:07:48,120 or if you saw it on a forum or on an account where the user was sharing their public key so that you 104 00:07:48,120 --> 00:07:50,460 can encrypt messages for them. 105 00:07:50,460 --> 00:07:57,240 In that case if you want to start sending encrypted messages to this person using this key you want 106 00:07:57,240 --> 00:08:03,820 to make sure first of all you copy the whole key from the start here all the way down to the end. 107 00:08:03,900 --> 00:08:09,240 I'm going to right click and copy and then you want to open a text editor. 108 00:08:09,240 --> 00:08:11,790 So we're going to go to accessories. 109 00:08:12,000 --> 00:08:15,090 We're going to open our text editor. 110 00:08:15,090 --> 00:08:19,130 We're going to paste everything that we copied in here. 111 00:08:19,170 --> 00:08:22,790 We're going to save control as or click here. 112 00:08:23,280 --> 00:08:26,880 And you want to store this in any location that you want. 113 00:08:26,880 --> 00:08:29,700 Now you don't really have to put it into a browser. 114 00:08:29,700 --> 00:08:38,100 I'm just going to put it there anyway and we're just going to call this John Wick again that a a C. 115 00:08:38,400 --> 00:08:40,510 We're going to click on save. 116 00:08:40,950 --> 00:08:45,030 And again we have the file now if we go back to this directory. 117 00:08:45,120 --> 00:08:49,140 We have the file the John wake dot EMC and inside it. 118 00:08:49,170 --> 00:08:54,060 It has the content of the public key of John. 119 00:08:54,120 --> 00:09:00,050 Now all we have to do is import this public key to our hearing to do that again. 120 00:09:00,180 --> 00:09:10,040 We have to open the passwords and keys here and we're going to go to file import and select the key 121 00:09:10,040 --> 00:09:12,050 that we want to import. 122 00:09:12,050 --> 00:09:16,130 If you couldn't see it here then make sure you go to the location where you downloaded it. 123 00:09:16,130 --> 00:09:18,170 So in my case it was in tor browser. 124 00:09:18,200 --> 00:09:23,680 And again we have the key that we want to import in here click on open. 125 00:09:24,010 --> 00:09:26,270 It's going to show you the information of this key. 126 00:09:26,300 --> 00:09:33,140 Again like I said Remember I said anybody who has access to this public key will be able to see your 127 00:09:33,140 --> 00:09:34,250 e-mail address. 128 00:09:34,370 --> 00:09:40,400 And as you can see we can actually see John's e-mail address right here and we can see his name right 129 00:09:40,400 --> 00:09:40,660 here. 130 00:09:40,670 --> 00:09:41,720 John Wick. 131 00:09:41,750 --> 00:09:48,060 That's why it's very important to use your anonymous or fake identity in here. 132 00:09:48,140 --> 00:09:56,050 We're going to click on import to add this key and now if we click on our G and new P.G. keys as you 133 00:09:56,050 --> 00:09:59,710 can see we have John weak as an entry in here. 134 00:09:59,860 --> 00:10:05,700 And as you can see John Wick in here has an icon of one gold key. 135 00:10:05,710 --> 00:10:09,280 We don't see two icons going back to John's computer. 136 00:10:09,550 --> 00:10:16,620 If we go to the passwords and keys in here you can see John has two keys in here because this is a keeper. 137 00:10:16,690 --> 00:10:20,180 John has his own private key and the public key. 138 00:10:20,260 --> 00:10:29,170 But at David's computer David only has the public key and that's why we see only one gold icon in here. 139 00:10:29,260 --> 00:10:32,230 Again if you're right click this and go to properties. 140 00:10:32,320 --> 00:10:36,890 You'll be able to see the name and the e-mail of the key owner. 141 00:10:36,910 --> 00:10:40,000 You can see the key I.D. and click in on details. 142 00:10:40,000 --> 00:10:45,300 You can see the fingerprint which like I said can be used to verify the owner of the key. 143 00:10:45,400 --> 00:10:53,480 And we'll talk all about that later on in the course for now we have imported the public key of the 144 00:10:53,480 --> 00:10:56,110 person that we want to communicate with. 145 00:10:56,120 --> 00:11:00,800 So right now we can start encrypting data and send it to John. 146 00:11:00,860 --> 00:11:08,120 And the only person that will be able to see the content of this data is John because he is the only 147 00:11:08,120 --> 00:11:10,280 person that has the private key.