@networkpro/web 1.12.2 → 1.12.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -0
- package/cspell.json +10 -1
- package/package.json +1 -1
- package/src/service-worker.js +4 -0
- package/static/docs/pgp-email.md +152 -0
- package/static/docs/pgp-win.md +67 -0
- package/static/docs/pgp.md +71 -0
package/CHANGELOG.md
CHANGED
|
@@ -12,6 +12,19 @@ This project attempts to follow [Keep a Changelog](https://keepachangelog.com/en
|
|
|
12
12
|
|
|
13
13
|
---
|
|
14
14
|
|
|
15
|
+
## [1.12.3] - 2025-06-04
|
|
16
|
+
|
|
17
|
+
### Added
|
|
18
|
+
|
|
19
|
+
- `static/docs/pgp.md`, `pgp-win.md`, and `pgp-email.md` added for reference.
|
|
20
|
+
These files have been temporarily stored until they can be migrated to the wiki.
|
|
21
|
+
|
|
22
|
+
### Changed
|
|
23
|
+
|
|
24
|
+
- Added the new Markdown files in `static/docs` to the `service-worker.js` cache ignore list.
|
|
25
|
+
|
|
26
|
+
---
|
|
27
|
+
|
|
15
28
|
## [1.12.2] – 2025-06-04
|
|
16
29
|
|
|
17
30
|
### Changed
|
package/cspell.json
CHANGED
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
"autorun",
|
|
9
9
|
"BACKTOP",
|
|
10
10
|
"beforeinstallprompt",
|
|
11
|
+
"Betterbird",
|
|
11
12
|
"bootentry",
|
|
12
13
|
"ccby",
|
|
13
14
|
"CCPA",
|
|
@@ -22,12 +23,17 @@
|
|
|
22
23
|
"homescreen",
|
|
23
24
|
"HREFTOP",
|
|
24
25
|
"Izzy",
|
|
26
|
+
"Keybase",
|
|
27
|
+
"keypair",
|
|
28
|
+
"keyserver",
|
|
29
|
+
"Kleopatra",
|
|
25
30
|
"lhci",
|
|
26
31
|
"lifecycles",
|
|
27
32
|
"lighthouseci",
|
|
28
33
|
"lighthouserc",
|
|
29
34
|
"lightningcss",
|
|
30
35
|
"linksheet",
|
|
36
|
+
"Mailvelope",
|
|
31
37
|
"Maricopa",
|
|
32
38
|
"mdsvex",
|
|
33
39
|
"navigations",
|
|
@@ -43,8 +49,10 @@
|
|
|
43
49
|
"npmjs",
|
|
44
50
|
"ntfy",
|
|
45
51
|
"obtainium",
|
|
52
|
+
"openpgp",
|
|
46
53
|
"posthog",
|
|
47
54
|
"prefs",
|
|
55
|
+
"publickey",
|
|
48
56
|
"reconsent",
|
|
49
57
|
"SIEM",
|
|
50
58
|
"SPDY",
|
|
@@ -59,7 +67,8 @@
|
|
|
59
67
|
"vcard",
|
|
60
68
|
"vite",
|
|
61
69
|
"vitest",
|
|
62
|
-
"webfonts"
|
|
70
|
+
"webfonts",
|
|
71
|
+
"Webmail"
|
|
63
72
|
],
|
|
64
73
|
"ignorePaths": [
|
|
65
74
|
".gitignore",
|
package/package.json
CHANGED
package/src/service-worker.js
CHANGED
|
@@ -32,6 +32,10 @@ const excludedAssets = [];
|
|
|
32
32
|
const IGNORE_PATHS = new Set([
|
|
33
33
|
"/docs/extensions.md",
|
|
34
34
|
"/docs/Home.md",
|
|
35
|
+
"/docs/pgp-email.md",
|
|
36
|
+
"/docs/pgp-win.md",
|
|
37
|
+
"/docs/pgp.md",
|
|
38
|
+
"/docs/tracking.md",
|
|
35
39
|
"/img/banner-1280x640.png",
|
|
36
40
|
"/img/logo-transparent.png",
|
|
37
41
|
"/img/logo.png",
|
|
@@ -0,0 +1,152 @@
|
|
|
1
|
+
# 📧 Encrypting Email with PGP
|
|
2
|
+
|
|
3
|
+
> This guide walks you through using PGP (Pretty Good Privacy) to encrypt email using both graphical and client-based tools.
|
|
4
|
+
|
|
5
|
+
PGP encryption ensures that only the intended recipient can read your email content — even if it's intercepted.
|
|
6
|
+
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
## 🔹 Option A: Outlook (Windows) with GpgOL
|
|
10
|
+
|
|
11
|
+
GpgOL is a plugin included with **Gpg4win** that integrates directly into Microsoft Outlook (desktop only).
|
|
12
|
+
|
|
13
|
+
### ✅ Requirements
|
|
14
|
+
|
|
15
|
+
- Gpg4win (with GpgOL selected during installation)
|
|
16
|
+
- Outlook 2010 or newer (desktop version)
|
|
17
|
+
- Recipient’s **public key**
|
|
18
|
+
|
|
19
|
+
> ⚠️ GpgOL does not work with Outlook for Microsoft 365 Web or Outlook Mobile. It is only compatible with the **desktop edition of Outlook** on Windows.
|
|
20
|
+
|
|
21
|
+
### 📥 Encrypting an Email in Outlook
|
|
22
|
+
|
|
23
|
+
1. Open Outlook and compose a new message
|
|
24
|
+
2. Enter the recipient’s email address (must match imported key)
|
|
25
|
+
3. Click the `Encrypt` button on the **GpgOL ribbon** tab
|
|
26
|
+
4. Send your email
|
|
27
|
+
|
|
28
|
+
> ✉️ Outlook will encrypt the email contents using the recipient's public key.
|
|
29
|
+
|
|
30
|
+
### 📥 Decrypting an Email in Outlook
|
|
31
|
+
|
|
32
|
+
When receiving an encrypted message:
|
|
33
|
+
|
|
34
|
+
- GpgOL will automatically prompt to decrypt it using your private key
|
|
35
|
+
- You may need to enter your key passphrase
|
|
36
|
+
|
|
37
|
+
> 💡 Tip: Manage keys with **Kleopatra** — launch from Start Menu
|
|
38
|
+
|
|
39
|
+
---
|
|
40
|
+
|
|
41
|
+
## 🔹 Option B: Thunderbird (Windows/macOS/Linux)
|
|
42
|
+
|
|
43
|
+
Thunderbird includes **built-in OpenPGP** support and is often preferred for privacy-focused users.
|
|
44
|
+
|
|
45
|
+
### ✅ Setup
|
|
46
|
+
|
|
47
|
+
1. [Download Thunderbird](https://www.thunderbird.net)
|
|
48
|
+
2. Add your email account
|
|
49
|
+
3. Go to: `Account Settings → End-to-End Encryption`
|
|
50
|
+
4. Generate a new key, or import your existing one
|
|
51
|
+
5. Import your recipient’s **public key**
|
|
52
|
+
|
|
53
|
+
### 🔐 Sending Encrypted Email
|
|
54
|
+
|
|
55
|
+
When composing a message:
|
|
56
|
+
|
|
57
|
+
- Click the **padlock** icon to enable encryption
|
|
58
|
+
- Click **sign** if you also want to verify authenticity
|
|
59
|
+
- Send as usual
|
|
60
|
+
|
|
61
|
+
---
|
|
62
|
+
|
|
63
|
+
## 🔹 Option C: Webmail with Mailvelope
|
|
64
|
+
|
|
65
|
+
**Mailvelope** adds OpenPGP support to Gmail, Outlook.com, Yahoo, and others.
|
|
66
|
+
|
|
67
|
+
### 🔧 Setup
|
|
68
|
+
|
|
69
|
+
1. Install [Mailvelope](https://www.mailvelope.com/) for Chrome or Firefox
|
|
70
|
+
2. Import your keys or generate a new pair
|
|
71
|
+
3. Use the Mailvelope overlay when composing encrypted emails
|
|
72
|
+
|
|
73
|
+
---
|
|
74
|
+
|
|
75
|
+
## Alternative PGP-Compatible Email Clients
|
|
76
|
+
|
|
77
|
+
In addition to widely used options like Outlook (via GpgOL) and Thunderbird, several other desktop email clients offer OpenPGP support—either natively or through plugins.
|
|
78
|
+
|
|
79
|
+
Notable alternatives include:
|
|
80
|
+
|
|
81
|
+
- **[Betterbird](https://www.betterbird.eu/):**
|
|
82
|
+
A privacy-focused Thunderbird fork with full PGP support.
|
|
83
|
+
▸ Available on Windows, Linux, and macOS.
|
|
84
|
+
|
|
85
|
+
- **[eM Client](https://www.emclient.com/):**
|
|
86
|
+
A feature-rich client with native OpenPGP integration and calendar/task support.
|
|
87
|
+
▸ Available on Windows, macOS, Android, and iOS.
|
|
88
|
+
▸ _Free tier supports 2 email accounts after a 30-day trial._
|
|
89
|
+
|
|
90
|
+
> 💡 **Note:** Be sure to verify the client’s compatibility with your GPG keyring (e.g., Gpg4win or Kleopatra on Windows).
|
|
91
|
+
|
|
92
|
+
---
|
|
93
|
+
|
|
94
|
+
## 📱 Mobile Email Clients with OpenPGP Support
|
|
95
|
+
|
|
96
|
+
For secure email on Android, the following apps support OpenPGP encryption via [**OpenKeychain**](https://www.openkeychain.org/):
|
|
97
|
+
|
|
98
|
+
- **[FairEmail](https://email.faircode.eu/)**
|
|
99
|
+
A lightweight, privacy-first email client for Android, offering built-in OpenPGP support, rich customization, and a modern, privacy-respecting interface.
|
|
100
|
+
|
|
101
|
+
- **[K-9 Mail](https://k9mail.app/)**
|
|
102
|
+
A veteran open-source Android mail client known for its simplicity and transparency. K-9 is now maintained by the Thunderbird team as part of their mobile strategy.
|
|
103
|
+
|
|
104
|
+
- **[Thunderbird Mobile](https://www.thunderbird.net/en-US/mobile/)**
|
|
105
|
+
A mobile adaptation of Thunderbird, currently built on K-9 Mail and maintained by the same team. Provides end-to-end encryption and an open-source, user-friendly experience.
|
|
106
|
+
|
|
107
|
+
> ⚠️ OpenPGP support on iOS is limited due to platform restrictions.
|
|
108
|
+
> Most options are proprietary or require external tools, and may not provide full compatibility with standard PGP workflows.
|
|
109
|
+
|
|
110
|
+
---
|
|
111
|
+
|
|
112
|
+
## 📤 Exporting and Sharing Public Keys
|
|
113
|
+
|
|
114
|
+
You can export your public key from **Kleopatra**, Thunderbird, or the command line, and share it via:
|
|
115
|
+
|
|
116
|
+
- Your website
|
|
117
|
+
- A keyserver (e.g., [keys.openpgp.org](https://keys.openpgp.org))
|
|
118
|
+
- Your GitHub profile (e.g., in `SECURITY.md` or a `PGP-KEY.asc` file)
|
|
119
|
+
|
|
120
|
+
### 🔧 Export via Command Line
|
|
121
|
+
|
|
122
|
+
If you’re using GnuPG directly:
|
|
123
|
+
|
|
124
|
+
```sh
|
|
125
|
+
gpg --armor --export your@email.com > publickey.asc
|
|
126
|
+
```
|
|
127
|
+
|
|
128
|
+
This creates a text-formatted (`.asc`) version of your public key that’s easy to upload or embed.
|
|
129
|
+
|
|
130
|
+
> 💡 Replace `your@email.com` with the email associated with your PGP key.
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
## 🛠 Troubleshooting Tips
|
|
135
|
+
|
|
136
|
+
- Ensure email address in key matches recipient’s address
|
|
137
|
+
- Key must be **trusted/imported** before encryption works
|
|
138
|
+
- For Outlook, restart if GpgOL ribbon does not appear
|
|
139
|
+
- Thunderbird may require re-indexing of OpenPGP keyring
|
|
140
|
+
|
|
141
|
+
---
|
|
142
|
+
|
|
143
|
+
## 📚 Learn More
|
|
144
|
+
|
|
145
|
+
- [Gpg4win Documentation](https://gpg4win.org/documentation.html)
|
|
146
|
+
- [How to Encrypt Emails with OpenPGP in Thunderbird (2022)](https://www.linuxbabe.com/security/encrypt-emails-gpg-thunderbird)
|
|
147
|
+
- [Mozilla OpenPGP Docs](https://support.mozilla.org/en-US/kb/openpgp-thunderbird-how-does-it-work)
|
|
148
|
+
- [Mailvelope Overview](https://www.mailvelope.com/help)
|
|
149
|
+
|
|
150
|
+
---
|
|
151
|
+
|
|
152
|
+
> 🔐 PGP protects your communication, but both parties must be using it correctly. Always test before sending sensitive content.
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
# 💻 Using PGP on Windows (Gpg4win & Kleopatra)
|
|
2
|
+
|
|
3
|
+
## This section walks through encrypting a message or file using **Gpg4win** and its GUI tool **Kleopatra**
|
|
4
|
+
|
|
5
|
+
### 📦 1. Install Gpg4win
|
|
6
|
+
|
|
7
|
+
- Download from: [https://gpg4win.org](https://gpg4win.org)
|
|
8
|
+
- During setup, make sure **Kleopatra** is selected.
|
|
9
|
+
|
|
10
|
+
---
|
|
11
|
+
|
|
12
|
+
### 🔑 2. Import the Recipient’s Public Key
|
|
13
|
+
|
|
14
|
+
1. Open **Kleopatra**
|
|
15
|
+
2. Click `File` → `Import Certificates…`
|
|
16
|
+
3. Select the `.asc` or `.gpg` file you downloaded
|
|
17
|
+
4. Confirm the fingerprint matches the published value
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
### ✍️ 3. Encrypt a Message (Text)
|
|
22
|
+
|
|
23
|
+
1. In Kleopatra, go to `Tools` → `Clipboard` → `Encrypt`
|
|
24
|
+
2. Paste your message
|
|
25
|
+
3. Select the recipient’s public key
|
|
26
|
+
4. Click **Encrypt**
|
|
27
|
+
5. Copy or save the armored output (begins with `-----BEGIN PGP MESSAGE-----`)
|
|
28
|
+
|
|
29
|
+
You can now send that encrypted message via email or any communication platform.
|
|
30
|
+
|
|
31
|
+
---
|
|
32
|
+
|
|
33
|
+
### 📁 4. Encrypt a File
|
|
34
|
+
|
|
35
|
+
1. Right-click on any file (e.g., PDF or TXT)
|
|
36
|
+
2. Choose **More GpgEX options** → **Encrypt**
|
|
37
|
+
3. Select the recipient key
|
|
38
|
+
4. The encrypted file will be saved with a `.gpg` extension
|
|
39
|
+
|
|
40
|
+
---
|
|
41
|
+
|
|
42
|
+
### 🔓 5. Decrypt a Message or File
|
|
43
|
+
|
|
44
|
+
To decrypt a file:
|
|
45
|
+
|
|
46
|
+
- Right-click `.gpg` file → **Decrypt and verify**
|
|
47
|
+
|
|
48
|
+
To decrypt a clipboard message:
|
|
49
|
+
|
|
50
|
+
- In Kleopatra, go to `Tools` → `Clipboard` → `Decrypt/Verify`
|
|
51
|
+
- Paste the encrypted message
|
|
52
|
+
- Kleopatra will prompt for your private key if needed
|
|
53
|
+
|
|
54
|
+
---
|
|
55
|
+
|
|
56
|
+
### 🧠 Tips for Windows Users
|
|
57
|
+
|
|
58
|
+
- Your private key is protected by a passphrase — never share it.
|
|
59
|
+
- You can export your public key for others to encrypt messages to you.
|
|
60
|
+
- Kleopatra also supports **signing** files and messages to verify your identity.
|
|
61
|
+
|
|
62
|
+
---
|
|
63
|
+
|
|
64
|
+
📘 For full walkthroughs, see:
|
|
65
|
+
|
|
66
|
+
- [Gpg4win Documentation](https://gpg4win.org/documentation.html)
|
|
67
|
+
- [Kleopatra User Guide (PDF)](https://files.gpg4win.org/doc/gpg4win-compendium-en.pdf)
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
# 🔐 How to Encrypt Messages Using PGP
|
|
2
|
+
|
|
3
|
+
This guide explains how to encrypt a message or file using PGP (Pretty Good Privacy) for secure communication with **Network Pro Strategies** or any contact with a published PGP key.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## 📥 1. Obtain the Recipient's Public Key
|
|
8
|
+
|
|
9
|
+
You can find the official public key at:
|
|
10
|
+
|
|
11
|
+
- [https://netwk.pro/pgp](https://netwk.pro/pgp)
|
|
12
|
+
- Or via GitHub, Keybase, or direct contact
|
|
13
|
+
|
|
14
|
+
Make sure the key fingerprint matches what the recipient advertises.
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## 🔧 2. Import the Public Key
|
|
19
|
+
|
|
20
|
+
Save the public key as a `.asc` or `.gpg` file, then run:
|
|
21
|
+
|
|
22
|
+
```bash
|
|
23
|
+
gpg --import path/to/public-key.asc
|
|
24
|
+
```
|
|
25
|
+
|
|
26
|
+
You can confirm the key is imported:
|
|
27
|
+
|
|
28
|
+
```bash
|
|
29
|
+
gpg --list-keys
|
|
30
|
+
```
|
|
31
|
+
|
|
32
|
+
## 🔏 3. Encrypt a Message
|
|
33
|
+
|
|
34
|
+
To encrypt a plain text file (e.g. message.txt) for the recipient:
|
|
35
|
+
|
|
36
|
+
```bash
|
|
37
|
+
gpg --encrypt --armor --recipient recipient@example.com message.txt
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
- --armor creates ASCII-formatted output
|
|
41
|
+
- Output is saved as message.txt.asc
|
|
42
|
+
|
|
43
|
+
## 🔏 4. Encrypt a File (Binary or Attachment)
|
|
44
|
+
|
|
45
|
+
```bash
|
|
46
|
+
gpg --encrypt --recipient recipient@example.com file.pdf
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
This will create file.pdf.gpg, which you can send securely.
|
|
50
|
+
|
|
51
|
+
## 🔓 Optional: Decrypting (For Testing)
|
|
52
|
+
|
|
53
|
+
If you're the recipient and want to decrypt a file:
|
|
54
|
+
|
|
55
|
+
```bash
|
|
56
|
+
gpg --decrypt file.txt.asc
|
|
57
|
+
```
|
|
58
|
+
|
|
59
|
+
## 🔐 Tips
|
|
60
|
+
|
|
61
|
+
- Always verify the recipient’s key fingerprint.
|
|
62
|
+
- Never share your private key.
|
|
63
|
+
- Use a strong passphrase to protect your keypair.
|
|
64
|
+
|
|
65
|
+
---
|
|
66
|
+
|
|
67
|
+
📘 For more help, see:
|
|
68
|
+
|
|
69
|
+
- [GnuPG Documentation](https://gnupg.org/documentation/)
|
|
70
|
+
- [A Practical Guide to GPG](https://www.linuxbabe.com/security/a-practical-guide-to-gpg-part-1-generate-your-keypair)
|
|
71
|
+
- [OpenPGP Best Practices](https://help.riseup.net/en/security/message-security/openpgp/best-practices)
|