@networkpro/web 1.12.2 → 1.12.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -12,6 +12,19 @@ This project attempts to follow [Keep a Changelog](https://keepachangelog.com/en
12
12
 
13
13
  ---
14
14
 
15
+ ## [1.12.3] - 2025-06-04
16
+
17
+ ### Added
18
+
19
+ - `static/docs/pgp.md`, `pgp-win.md`, and `pgp-email.md` added for reference.
20
+ These files have been temporarily stored until they can be migrated to the wiki.
21
+
22
+ ### Changed
23
+
24
+ - Added the new Markdown files in `static/docs` to the `service-worker.js` cache ignore list.
25
+
26
+ ---
27
+
15
28
  ## [1.12.2] – 2025-06-04
16
29
 
17
30
  ### Changed
package/cspell.json CHANGED
@@ -8,6 +8,7 @@
8
8
  "autorun",
9
9
  "BACKTOP",
10
10
  "beforeinstallprompt",
11
+ "Betterbird",
11
12
  "bootentry",
12
13
  "ccby",
13
14
  "CCPA",
@@ -22,12 +23,17 @@
22
23
  "homescreen",
23
24
  "HREFTOP",
24
25
  "Izzy",
26
+ "Keybase",
27
+ "keypair",
28
+ "keyserver",
29
+ "Kleopatra",
25
30
  "lhci",
26
31
  "lifecycles",
27
32
  "lighthouseci",
28
33
  "lighthouserc",
29
34
  "lightningcss",
30
35
  "linksheet",
36
+ "Mailvelope",
31
37
  "Maricopa",
32
38
  "mdsvex",
33
39
  "navigations",
@@ -43,8 +49,10 @@
43
49
  "npmjs",
44
50
  "ntfy",
45
51
  "obtainium",
52
+ "openpgp",
46
53
  "posthog",
47
54
  "prefs",
55
+ "publickey",
48
56
  "reconsent",
49
57
  "SIEM",
50
58
  "SPDY",
@@ -59,7 +67,8 @@
59
67
  "vcard",
60
68
  "vite",
61
69
  "vitest",
62
- "webfonts"
70
+ "webfonts",
71
+ "Webmail"
63
72
  ],
64
73
  "ignorePaths": [
65
74
  ".gitignore",
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@networkpro/web",
3
3
  "private": false,
4
- "version": "1.12.2",
4
+ "version": "1.12.3",
5
5
  "description": "Locking Down Networks, Unlocking Confidence | Security, Networking, Privacy — Network Pro Strategies",
6
6
  "keywords": [
7
7
  "advisory",
@@ -32,6 +32,10 @@ const excludedAssets = [];
32
32
  const IGNORE_PATHS = new Set([
33
33
  "/docs/extensions.md",
34
34
  "/docs/Home.md",
35
+ "/docs/pgp-email.md",
36
+ "/docs/pgp-win.md",
37
+ "/docs/pgp.md",
38
+ "/docs/tracking.md",
35
39
  "/img/banner-1280x640.png",
36
40
  "/img/logo-transparent.png",
37
41
  "/img/logo.png",
@@ -0,0 +1,152 @@
1
+ # 📧 Encrypting Email with PGP
2
+
3
+ > This guide walks you through using PGP (Pretty Good Privacy) to encrypt email using both graphical and client-based tools.
4
+
5
+ PGP encryption ensures that only the intended recipient can read your email content — even if it's intercepted.
6
+
7
+ ---
8
+
9
+ ## 🔹 Option A: Outlook (Windows) with GpgOL
10
+
11
+ GpgOL is a plugin included with **Gpg4win** that integrates directly into Microsoft Outlook (desktop only).
12
+
13
+ ### ✅ Requirements
14
+
15
+ - Gpg4win (with GpgOL selected during installation)
16
+ - Outlook 2010 or newer (desktop version)
17
+ - Recipient’s **public key**
18
+
19
+ > ⚠️ GpgOL does not work with Outlook for Microsoft 365 Web or Outlook Mobile. It is only compatible with the **desktop edition of Outlook** on Windows.
20
+
21
+ ### 📥 Encrypting an Email in Outlook
22
+
23
+ 1. Open Outlook and compose a new message
24
+ 2. Enter the recipient’s email address (must match imported key)
25
+ 3. Click the `Encrypt` button on the **GpgOL ribbon** tab
26
+ 4. Send your email
27
+
28
+ > ✉️ Outlook will encrypt the email contents using the recipient's public key.
29
+
30
+ ### 📥 Decrypting an Email in Outlook
31
+
32
+ When receiving an encrypted message:
33
+
34
+ - GpgOL will automatically prompt to decrypt it using your private key
35
+ - You may need to enter your key passphrase
36
+
37
+ > 💡 Tip: Manage keys with **Kleopatra** — launch from Start Menu
38
+
39
+ ---
40
+
41
+ ## 🔹 Option B: Thunderbird (Windows/macOS/Linux)
42
+
43
+ Thunderbird includes **built-in OpenPGP** support and is often preferred for privacy-focused users.
44
+
45
+ ### ✅ Setup
46
+
47
+ 1. [Download Thunderbird](https://www.thunderbird.net)
48
+ 2. Add your email account
49
+ 3. Go to: `Account Settings → End-to-End Encryption`
50
+ 4. Generate a new key, or import your existing one
51
+ 5. Import your recipient’s **public key**
52
+
53
+ ### 🔐 Sending Encrypted Email
54
+
55
+ When composing a message:
56
+
57
+ - Click the **padlock** icon to enable encryption
58
+ - Click **sign** if you also want to verify authenticity
59
+ - Send as usual
60
+
61
+ ---
62
+
63
+ ## 🔹 Option C: Webmail with Mailvelope
64
+
65
+ **Mailvelope** adds OpenPGP support to Gmail, Outlook.com, Yahoo, and others.
66
+
67
+ ### 🔧 Setup
68
+
69
+ 1. Install [Mailvelope](https://www.mailvelope.com/) for Chrome or Firefox
70
+ 2. Import your keys or generate a new pair
71
+ 3. Use the Mailvelope overlay when composing encrypted emails
72
+
73
+ ---
74
+
75
+ ## Alternative PGP-Compatible Email Clients
76
+
77
+ In addition to widely used options like Outlook (via GpgOL) and Thunderbird, several other desktop email clients offer OpenPGP support—either natively or through plugins.
78
+
79
+ Notable alternatives include:
80
+
81
+ - **[Betterbird](https://www.betterbird.eu/):**
82
+ A privacy-focused Thunderbird fork with full PGP support.
83
+ ▸ Available on Windows, Linux, and macOS.
84
+
85
+ - **[eM Client](https://www.emclient.com/):**
86
+ A feature-rich client with native OpenPGP integration and calendar/task support.
87
+ ▸ Available on Windows, macOS, Android, and iOS.
88
+ ▸ _Free tier supports 2 email accounts after a 30-day trial._
89
+
90
+ > 💡 **Note:** Be sure to verify the client’s compatibility with your GPG keyring (e.g., Gpg4win or Kleopatra on Windows).
91
+
92
+ ---
93
+
94
+ ## 📱 Mobile Email Clients with OpenPGP Support
95
+
96
+ For secure email on Android, the following apps support OpenPGP encryption via [**OpenKeychain**](https://www.openkeychain.org/):
97
+
98
+ - **[FairEmail](https://email.faircode.eu/)**
99
+ A lightweight, privacy-first email client for Android, offering built-in OpenPGP support, rich customization, and a modern, privacy-respecting interface.
100
+
101
+ - **[K-9 Mail](https://k9mail.app/)**
102
+ A veteran open-source Android mail client known for its simplicity and transparency. K-9 is now maintained by the Thunderbird team as part of their mobile strategy.
103
+
104
+ - **[Thunderbird Mobile](https://www.thunderbird.net/en-US/mobile/)**
105
+ A mobile adaptation of Thunderbird, currently built on K-9 Mail and maintained by the same team. Provides end-to-end encryption and an open-source, user-friendly experience.
106
+
107
+ > ⚠️ OpenPGP support on iOS is limited due to platform restrictions.
108
+ > Most options are proprietary or require external tools, and may not provide full compatibility with standard PGP workflows.
109
+
110
+ ---
111
+
112
+ ## 📤 Exporting and Sharing Public Keys
113
+
114
+ You can export your public key from **Kleopatra**, Thunderbird, or the command line, and share it via:
115
+
116
+ - Your website
117
+ - A keyserver (e.g., [keys.openpgp.org](https://keys.openpgp.org))
118
+ - Your GitHub profile (e.g., in `SECURITY.md` or a `PGP-KEY.asc` file)
119
+
120
+ ### 🔧 Export via Command Line
121
+
122
+ If you’re using GnuPG directly:
123
+
124
+ ```sh
125
+ gpg --armor --export your@email.com > publickey.asc
126
+ ```
127
+
128
+ This creates a text-formatted (`.asc`) version of your public key that’s easy to upload or embed.
129
+
130
+ > 💡 Replace `your@email.com` with the email associated with your PGP key.
131
+
132
+ ---
133
+
134
+ ## 🛠 Troubleshooting Tips
135
+
136
+ - Ensure email address in key matches recipient’s address
137
+ - Key must be **trusted/imported** before encryption works
138
+ - For Outlook, restart if GpgOL ribbon does not appear
139
+ - Thunderbird may require re-indexing of OpenPGP keyring
140
+
141
+ ---
142
+
143
+ ## 📚 Learn More
144
+
145
+ - [Gpg4win Documentation](https://gpg4win.org/documentation.html)
146
+ - [How to Encrypt Emails with OpenPGP in Thunderbird (2022)](https://www.linuxbabe.com/security/encrypt-emails-gpg-thunderbird)
147
+ - [Mozilla OpenPGP Docs](https://support.mozilla.org/en-US/kb/openpgp-thunderbird-how-does-it-work)
148
+ - [Mailvelope Overview](https://www.mailvelope.com/help)
149
+
150
+ ---
151
+
152
+ > 🔐 PGP protects your communication, but both parties must be using it correctly. Always test before sending sensitive content.
@@ -0,0 +1,67 @@
1
+ # 💻 Using PGP on Windows (Gpg4win & Kleopatra)
2
+
3
+ ## This section walks through encrypting a message or file using **Gpg4win** and its GUI tool **Kleopatra**
4
+
5
+ ### 📦 1. Install Gpg4win
6
+
7
+ - Download from: [https://gpg4win.org](https://gpg4win.org)
8
+ - During setup, make sure **Kleopatra** is selected.
9
+
10
+ ---
11
+
12
+ ### 🔑 2. Import the Recipient’s Public Key
13
+
14
+ 1. Open **Kleopatra**
15
+ 2. Click `File` → `Import Certificates…`
16
+ 3. Select the `.asc` or `.gpg` file you downloaded
17
+ 4. Confirm the fingerprint matches the published value
18
+
19
+ ---
20
+
21
+ ### ✍️ 3. Encrypt a Message (Text)
22
+
23
+ 1. In Kleopatra, go to `Tools` → `Clipboard` → `Encrypt`
24
+ 2. Paste your message
25
+ 3. Select the recipient’s public key
26
+ 4. Click **Encrypt**
27
+ 5. Copy or save the armored output (begins with `-----BEGIN PGP MESSAGE-----`)
28
+
29
+ You can now send that encrypted message via email or any communication platform.
30
+
31
+ ---
32
+
33
+ ### 📁 4. Encrypt a File
34
+
35
+ 1. Right-click on any file (e.g., PDF or TXT)
36
+ 2. Choose **More GpgEX options** → **Encrypt**
37
+ 3. Select the recipient key
38
+ 4. The encrypted file will be saved with a `.gpg` extension
39
+
40
+ ---
41
+
42
+ ### 🔓 5. Decrypt a Message or File
43
+
44
+ To decrypt a file:
45
+
46
+ - Right-click `.gpg` file → **Decrypt and verify**
47
+
48
+ To decrypt a clipboard message:
49
+
50
+ - In Kleopatra, go to `Tools` → `Clipboard` → `Decrypt/Verify`
51
+ - Paste the encrypted message
52
+ - Kleopatra will prompt for your private key if needed
53
+
54
+ ---
55
+
56
+ ### 🧠 Tips for Windows Users
57
+
58
+ - Your private key is protected by a passphrase — never share it.
59
+ - You can export your public key for others to encrypt messages to you.
60
+ - Kleopatra also supports **signing** files and messages to verify your identity.
61
+
62
+ ---
63
+
64
+ 📘 For full walkthroughs, see:
65
+
66
+ - [Gpg4win Documentation](https://gpg4win.org/documentation.html)
67
+ - [Kleopatra User Guide (PDF)](https://files.gpg4win.org/doc/gpg4win-compendium-en.pdf)
@@ -0,0 +1,71 @@
1
+ # 🔐 How to Encrypt Messages Using PGP
2
+
3
+ This guide explains how to encrypt a message or file using PGP (Pretty Good Privacy) for secure communication with **Network Pro Strategies** or any contact with a published PGP key.
4
+
5
+ ---
6
+
7
+ ## 📥 1. Obtain the Recipient's Public Key
8
+
9
+ You can find the official public key at:
10
+
11
+ - [https://netwk.pro/pgp](https://netwk.pro/pgp)
12
+ - Or via GitHub, Keybase, or direct contact
13
+
14
+ Make sure the key fingerprint matches what the recipient advertises.
15
+
16
+ ---
17
+
18
+ ## 🔧 2. Import the Public Key
19
+
20
+ Save the public key as a `.asc` or `.gpg` file, then run:
21
+
22
+ ```bash
23
+ gpg --import path/to/public-key.asc
24
+ ```
25
+
26
+ You can confirm the key is imported:
27
+
28
+ ```bash
29
+ gpg --list-keys
30
+ ```
31
+
32
+ ## 🔏 3. Encrypt a Message
33
+
34
+ To encrypt a plain text file (e.g. message.txt) for the recipient:
35
+
36
+ ```bash
37
+ gpg --encrypt --armor --recipient recipient@example.com message.txt
38
+ ```
39
+
40
+ - --armor creates ASCII-formatted output
41
+ - Output is saved as message.txt.asc
42
+
43
+ ## 🔏 4. Encrypt a File (Binary or Attachment)
44
+
45
+ ```bash
46
+ gpg --encrypt --recipient recipient@example.com file.pdf
47
+ ```
48
+
49
+ This will create file.pdf.gpg, which you can send securely.
50
+
51
+ ## 🔓 Optional: Decrypting (For Testing)
52
+
53
+ If you're the recipient and want to decrypt a file:
54
+
55
+ ```bash
56
+ gpg --decrypt file.txt.asc
57
+ ```
58
+
59
+ ## 🔐 Tips
60
+
61
+ - Always verify the recipient’s key fingerprint.
62
+ - Never share your private key.
63
+ - Use a strong passphrase to protect your keypair.
64
+
65
+ ---
66
+
67
+ 📘 For more help, see:
68
+
69
+ - [GnuPG Documentation](https://gnupg.org/documentation/)
70
+ - [A Practical Guide to GPG](https://www.linuxbabe.com/security/a-practical-guide-to-gpg-part-1-generate-your-keypair)
71
+ - [OpenPGP Best Practices](https://help.riseup.net/en/security/message-security/openpgp/best-practices)