Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Start a free Courses trial
to watch this video
How does GPG protect sensitive data?
If you want to try GPG/PGP out yourself, head to their Download Page. You can use PGP/GPG for more than just encrypting emails, too. Your keys can be used to sign documents, verify that you created Git commits, and more.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up