About the PGP Key Generator & Message Encrypter
This page explains what the PGP tool does, how it keeps everything in your browser, and how to use it safely for practice, training, and small personal workflows without needing a full email client.
What this tool does
The PGP Key Generator and Message Encrypter gives you a simple way to work with OpenPGP keys in your browser. It helps you create a key pair, encrypt messages for someone else using their public key, and decrypt messages that were encrypted for you.
Everything happens in the browser tab you are using. Keys and messages are handled in memory only. The page does not send your keys or messages to CyberLife Coach or to any other server as part of the cryptography process.
You can use this tool to
- Create a fresh OpenPGP key pair for testing and training
- Copy and share your public key so others can send you private messages
- Encrypt a message using someone else's public key
- Paste an encrypted message and decrypt it with your private key and passphrase
This tool is best suited for
- Personal education and self study
- Cybersecurity training labs and classroom demos
- Small experiments where you want to see PGP in action
- Practice before you move to a dedicated PGP email client
How it works under the hood
The main PGP page loads the OpenPGP.js library directly into your browser. When you click the buttons to generate, encrypt, or decrypt, the library performs the cryptographic operations in the same tab that you see.
- No account or login is required to use the page
- No key escrow or cloud backup is built in
- No server side storage of keys or messages is built in
If you close the tab without copying your keys, they are gone. You are responsible for copying, saving, backing up, and revoking keys that you create with this tool.
Quick start guide
- Open the PGP tool and go to the "Generate PGP key pair" tab.
- Enter a name, an email, and a strong passphrase, then generate a key pair.
- Copy the public key and share it with someone you trust, for example in a secure chat.
- Ask them to encrypt a message for you and send back the encrypted text.
- Paste your private key, your passphrase, and the encrypted message in the "Decrypt" tab and decrypt it.
This simple loop gives you a hands on feel for how public key encryption works in practice without needing to reconfigure your email client.
What this tool is not
It is important to understand the limits. This browser page does not replace:
- A full PGP email integration with your mail client
- A hardened, long term key management solution
- A full security program for sensitive sources or high risk journalism
- A password manager or secure secret vault
You can think of it as a focused "workbench" for testing and learning PGP, not an all purpose secure storage platform.
Good use cases
- Teaching students how public and private keys work
- Demonstrating encrypted messaging in workshops
- Checking that a public key someone sent you is usable
- Experimenting with key sizes and passphrases in a lab
Security and privacy notes
Even though cryptography happens in your browser, your overall privacy still depends on your device, your operating system, your browser extensions, and what else is running on the machine.
- Avoid generating or using keys on shared or untrusted computers
- Keep your browser and operating system updated
- Be careful when pasting keys into other sites or chat tools
- Store key backups in a secure location under your control
Best practice checklist
- Use a long, unique passphrase for each private key
- Create and safely store a revocation certificate in a separate place
- Document where you saved copies of your keys and who has access
- Retire and revoke old keys when you no longer need them
This PGP explanation page and the underlying tool are provided for education, training, and personal experimentation. They do not provide legal, security, or compliance advice. To the best of our knowledge, cryptographic operations run in your browser and keys and messages are not transmitted to CyberLife Coach or to any external server as part of those operations. You are responsible for how you generate, export, store, and share any keys or ciphertext, including backups, revocation, and passphrase hygiene. No guarantees are made about cryptographic strength, implementation flaws, browser or device compromise, or compatibility with other OpenPGP tools. For high risk work or sensitive sources, use a dedicated, well reviewed PGP setup and seek expert guidance.