“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by a dedicated attacker. There is a lot of validity to this approach. Most companies and organizations are super easy to hack and compromise. However, it doesn’t have to be this way.
Voice-assisted technologies are extremely popular; already there are2.5 billionsuch devices in use and that's expected to triple to 8 billion by 2023. This growth appears to be unstoppable—despite theprivacy and security vulnerabilitiesin mainstream voice-assisted technology.
Originall written in 2004, here you will find one of the most extensive HowTo's available for GnuPG. It truly is a 'soup to nuts' overview.
This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system. To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German.