With that i guess i would appreciate someone with more information on it
“GPG” stands for “Gnu Privacy Guard" and is has the functionality of PGP less some proprietary stuff GPG users don't really need.
GPG is used with Bitcoin affiliated services because it is open source, can be used anonymously, and works well for protecting from unauthorized access.
Bitcoin.org software releases include GPG keys of those who built it to ensure the software is authentic and not tampered with.
The #bitcoin-otc IRC channel uses a GPG-based authentication method (gribble) and reputation/trust history system -- its Web of Trust (Wot). You might see this trust history in third party services also, such as with trader profiles on LocalBitcoins.
All orders through MPEx exchange are transmitted as GPG signed messages.
You might see GPG-signed messages in the forums, especially for offers and acceptances, as these are legal agreements and a digital signature can be just as good as a wet ink one.
The benefits don't come without a cost however. And the main cost is convenience. If you receive an encrypted e-mail and you accessing your e-mail from a mobile phone in which you did not install GPG (or transfer over your private key) then you will not be able to read that e-mail until you are back on a device with GPG and your private key.
So step 1 to using GPG is to install the software and generate a key (assuming you don't already have one). Which software you use will depend on your operating system:
-
http://wiki.bitcoin-otc.com/wiki/GPG_authentication#Third-party_guidesBefore you actually start using GPG for anything, make sure you have backed up your GPG private key and your revocation certificate (and store that backup in a secure place):
-
http://www.gnupg.org/gph/en/manual.html#AEN513Then, instruction from there will depend on what you want to do next. For the -otc Web of Trust (WoT), you'll need to register your key with the gribble bot:
-
http://wiki.bitcoin-otc.com/wiki/GPG_authentication#Encryption-based_authentication_via_GPG_key_with_the_botIf you want to encrypt e-mail, the instructions will depend on which e-mail program or service you use. You can always manually encypt using the command line tools, and then paste the encrypted message in your message (e.g. using ASCII armored mode) or attach it as a file.