 Okay So first what is no PG no PG? Or a group privacy guard is a complete and free implementation of open PGP standard It allows you to encrypt and sign your data and communications new PG has scouts of options Which make it flexible and powerful encryption? Framework, however, this also makes it extremely complicated to get started with and that quite reason reason puts people off So I have tried to use the new PG since a long time spent a lot of time reading the detailed and complicated Tutorials manuals, etc. And still I find myself lost when trying to use group PG Some of the things that make no PG difficult in my opinion are The new PG command is monolithic blotted with functionality and options. The dogs are not clearly structured The number of commands and options is huge There is no clear distinction between the commands and the options the supported use cases are not so clear It tries to support everything and the terminology terminology is a bit confusing and counterintuitive Now what is easy new PG easy new PG is a Rapper script that aims to simplify the process of using group PG And the idea is that the more people use strong encryption. The better is for everyone easy No big no big tries to offer a simpler interface with much less Comments and options better organization better organized and structured with a more intuitive Terminology with a modular modular construction. That is also easy to customize adapt and extend Easy new PG is opinionate opinionated in order to simplify to simplify things easy No PG is opinionate opinionated about the right way to use group PG. This means that well GPG offers lots of options and flexibility to perform a certain task eGPG uses just a sensible default way in order to keep things Simple and not to bewilder the user with countless choices For example, when you create a new key in GPG you have to specify a lot of options most of Which make no sense for a beginner. So they will just use the defaults anyway eGPG on the other hand just ask for a name and the email address filling up the rest with the reasonable default values Not on not only that but it also goes on and generates automatically the needed sub keys according to well-known recommendations and the best practices of using GPG or When encrypting the file it also automatically signs it encrypts it to the author as well and generates the output In the text format ask the armor armor, which is more universal than the binary format This simplicity makes it easier for the beginners to get started at the same time the selected subset of Operations and features covers most of the common cases of usage So hopefully it should be sufficient for the everyday needs of most of the user users eGPG integrates seamlessly with GPG In case users need to use some to use some advanced features of our commands, which are not suited Supported by eGPG They can they can go on and use GPG itself at any time because eGPG also integrates seamlessly with GPG So the reduced set of supported Operations and features while being convenient for everyday usage does not limit or prevent users for doing more advanced or complex things For example, if you want to do some extra editing To the key which can't be done with eGPG due to its limited set of functionality You can do it like this eGPG and then GPG and then the rest is GPG options and commands so GPG is Executed as a sub command of eGPG and this makes sure and ensures that It uses the same environment Which is a new PG home as eGPG so the command That is executed actually is GPG But it uses the environment of eGPG Also when initiating a new eGPG environment with the command eGPG in it You can migrate all the data from an existing GPG or eGPG environment With the command eGPG migrate or you can fetch pick up only certain keys or contacts public keys for example eGPG key fetch and then the ID of the key eGPG contact fetch and then the ID of the public key eGPG has a clear has a clear and intuitive terminology one of the things that confuses people while using eGPG is the overloaded and Unclear terminology about keys about signatures, etc. eGPG tries to improve this by making a clear distinction between the private keys and the public keys In eGPG there is only one primary key which is used for signing and the sub key which is used for the Decryption all the public keys are called contacts since they contain the names and email addresses of the people that you That you use to communicate I either send them and keep it messages or verify their signatures If you say public key to a beginner you will also have to explain to him some Cryptographic details and how public keys should be used but if you say contact everybody gets that it it contains details that Enable and facilitate communication Also, it makes more sense when you certify and trust contact rather than editing a key and Changing its certification certification and trust levels eGPG is transparent and auditable being built as a set of cell shell scripts eGPG is quite transparent and auditable different from GUI for example or web service If you are concerned concerned about what it does open up the files and read them or have some someone you trust Read them the size of the main script is less than 250 lines well within the understanding reach of most of the users most of the commands are implemented on their own script and each of these scripts is Approximately about 50 lines long or on average eGPG commands the set of commands and options of eGPG is Well-structured and intuitive there are commands for working with files for signing and encryption managing the key managing contacts and other extra commands The commands for working with files are these eGPG sealed and then a file and then a list of recipients eGPG open and then the file which is sealed which is the reverse option of sealing eGPG sign To get the signature for a file and then eGPG verify to verify the signature of a file eGPG key commands There are commands to generate a new key or fetch an existing one to back up and restore the key to split and join the key to Generate revocation certificate to evoke the key to delete the key, etc eGPG contact commands the commands about contacts include commands to search and receive Contacts from the key server network to export and import from files to fetch from existing gpg eGPG directories to certify and trust etc Managing the keys to keep things simple eGPG supports only one private key per directory or for environment But there are ways to use several keys if needed for example It can be done by using several eGPG directories or configurations which can work in parallel in parallel and independently of each other This is a designed decision and is on propose Not only for simplicity, but also because when you need more than one key you usually use them in different contexts So it makes more sense to keep and manage them separately and independently of each other Which could also help to avoid any confusion or mistakes when using them eGPG extends the features of GPG eGPG combines the features of GPG with external tools or commands in order to Achieve better results or to be more user-friendly for example when making the backup of the key The output is produced as a PDF as a PDF file with a 2d barcode Which can be printed on a paper and stored away on a safe place later This can be easily scanned back to digital format and restored This is achieved by exporting the key from GPG in ASCII armor format Then using a bunch of Linux commands and tools like QR and code and convert To convert it to the proper PDF format. There is nothing that cannot be done manually or with a Shell script, but eGPG already automates things for you in a single command so that you can immediately Immediately take advantage of best practices and recommendations Another example is printing the fingerprint of the key as a 2d barcode and picking it up from the camera. This can simplify This can simplify the exchange of keys in mobile phones if people have five physical contact For example in a meeting one of them can show the code on the screen and the other one can scan it from the Camera and automatically fetch the details from the key server Or the fingerprint can be printed as a 2d barcode on a business card and scanned from there Yet another example is moving the main key that is used for signing and certification to a dongle USB flash drive For portability and security for example the USB flash drive Can be encrypted This is done with the external command eGPG key to dongle So it can also be done by giving several Unix commands, but with a single comment is much more easier Splitting the key you can split a key into three partial keys So that any two of them can be combined to recreate the original key, but a single one Is not enough so a single partial key is not enough eGPG takes Advantage of this to save a partial key on the local machine and another partial on a dongle USB flash drive Or removal removable device the third partial key is used as a backup to Recover the full key in case that the dongle or the computer is lost and it can be stored for example on a cloud account Splitting the key into partial keys makes key management safer and more robust In case that you lose the dongle the key is not the conspired because a single partial key is not enough to reconstruct the full key The same goes on for backup Partial key you can store it on cloud for example, and if somebody if somebody manages to get it They still cannot get your key Similarly, if you lose the dongle or change the PC You still can recover the key using the remaining partial key and the backup partial and This can be done with these commands eGPG key split eGPG key join and eGPG key recover eGPG can work on any platform the file platform dot Shell contains a couple of functions that can be platform dependent the platform Is detected automatically and these functions are overridden with the right implementation for the current platform So eGPG is flexible enough to potentially work on any platform However, currently it has been tested only on Ubuntu and Debian eGPG is customizable and extensible If eGPG doesn't fit your workflow, you can adapt and extend it to fit your way of doing things You can also share your extensions with others in the form of external commands the file Customized dot shell can be used to redefine and customize some functions without having to touch the code of the main script external an external command named example can be overridden or defined by adding the file cmd underscore example dot shell on directory eGPG dear and for an external For an external command the script will look in several places and the first one that it finds it finds will Will pick up eGPG enables a scripting I think that it is time it is time to stop writing detailed tutorials with the best practices on how to use GPG on certain situations Writing said scripts in eGPG or some other framework that automate these processes GPG itself does not facilitate writing such scripts and eGPG tries to improve this eGPG Criticism the eGPG prefix have expressed their concerns that since eGPG is just a wrapper script to GPG It is too fragile This is so because the GPG command line was meant to be an interactive tool Not a streamline tool that can be easily combined with other tools as such It's output format can change at any time and even small changes can break eGPG a possible defense argument So the improvements that can be done Are proposed as a Google summer of code project Which you can find on this web page and some of the improvements are these Thank you for your attention if you have any comments you can contact me on this email address