Skip to content

15. Cryptographic Identity Initialization

    • Tails includes a tool for digital keys (called GPG keys)

    • These keys are used to:

      • Prove identity

      • Sign messages

      • Encrypt data

    Important for beginners:

    • Keys may already exist

    • Or there may be no keys yet

    • Both situations are normal

    Simple idea:
    Keys are like digital ID cards.


    A keyring is where keys are stored.

    In Tails:

    • Keys are kept in a specific place

    • They are not spread randomly

    • If persistence is enabled, keys can be saved there

    What this means:

    • If keys are saved, they appear again next time

    • If not saved, they disappear after shutdown

    Simple idea:
    Keyring = key storage box.


    Important rule:

    • One key = one identity

    You should understand:

    • Do not reuse one key for many purposes

    • Do not mix identities with the same key

    Examples of mixing (bad):

    • Same key for personal and anonymous use

    • Same key across unrelated activities

    Simple idea:
    Different roles need different digital IDs.


    If you save keys in Persistent Storage:

    • They stay across sessions

    • They create continuity

    • They can be recognized again

    This is:

    • Useful for long-term identity

    • Risky for anonymity

    Important understanding:

    • Saved keys = same identity every time

    Simple idea:
    Saving a key means you come back as the same person.


    Misbinding means:

    • Accidentally linking a key to the wrong identity

    This can happen when:

    • You use the same key in different contexts

    • You forget which key belongs to which purpose

    Result:

    • Identities get mixed

    • Anonymity can be reduced

    Best habit:

    • Be very clear what a key is for

    • If unsure, do not use it

    Simple idea:
    Wrong key in the wrong place causes problems.


    For first-time users:

    • Do not rush to create keys

    • Do not enable key persistence without reason

    • Observation is enough at this stage

    Keys are powerful tools, but:

    • Power requires discipline

    • Discipline comes later

    Simple idea:
    Understand keys first, use them later.


16-wallet-environment-preparation