Examples of use of PGP
1. PGP, like all encryption algorithms, requires a password for decryption.
2. The attackers in this case were searching for PGP keys, a specific technology that group members routinely use to prevent outsiders or eavesdroppers from reading any intercepted messages.
3. To protect document donors and the site itself, Wikileaks uses its own coded software combined with, for the techies out there, modified versions of Freenet and PGP.
4. He said the increased fees for the PGP courses was just 30 per cent of the average salary bagged by IIM–A students during annual placements.
5. Files are protected using PGP, or Pretty Good Privacy, a virtually unbreakable form of encryption software that is also used by intelligence agencies around the world.