{"id":4951,"date":"2019-06-03T22:35:48","date_gmt":"2019-06-03T21:35:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4951"},"modified":"2021-03-30T22:39:48","modified_gmt":"2021-03-30T21:39:48","slug":"pgp-encryption","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption","title":{"rendered":"Understanding PGP Encryption"},"content":{"rendered":"<p>PGP (Pretty Good Privacy) is an encryption program used to send highly sensitive information over the internet. It relies on a mix of public key encryption methods as well as more traditional encryption methods to protect against attackers. Generally PGP encryption, along with\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/use-cases\/data-archiving\" target=\"_blank\" rel=\"noopener\">other forms of data protection<\/a>, can be a valuable part of your customers\u2019 security strategy.<\/p>\n<p>In the early days of encryption, a user would craft a code, or key, and use that key to encrypt whatever sensitive information they were trying to send. The same key that was used to encrypt the key was also used to decrypt it. The use of one key to encrypt and decrypt is known as traditional, symmetric-key encryption. It\u2019s great, except for one not-so-small factor\u2014you can send the encrypted message, but for the receiver to understand the message they need the key. This is where risk comes into play. A key in transit is at the mercy of attackers looking to intercept the message, snag the key, and subsequently, gain access to highly sensitive data and information.<\/p>\n<h3><b>What is a PGP encryption key?<\/b><\/h3>\n<p>If you\u2019re wondering what a PGP key is, in fact, it\u2019s more than a single key\u2014it\u2019s a term used to describe a pair of public and private keys that work together to encrypt and decrypt information. PGP was developed by Phil Zimmerman in 1991. Phil, an antinuclear activist, believed the world needed a better way to store and send sensitive information. He launched PGP as a free service and it quickly gained attention and popularity.<\/p>\n<p>How PGP works is that the encryption relies primarily on a form of public key encryption. Public key encryption requires the use of two keys\u2014a public key and a private key\u2014and is considered an asymmetric encryption approach. Public keys are large, numerical values used to encrypt emails, texts, and files. Private keys are algorithms used to decrypt that information.<\/p>\n<p>To put it simply, a user creates a public key and shares it with whoever they please. This key does not need to be a secret. In fact, a user can even post their public key openly, allowing anyone to access their key and use it to send them information. It\u2019s the private key that needs to be protected. A user leverages the private key to decrypt information that has been encrypted using their public key. No one else should have access to their private key except for them.<\/p>\n<p>There are several widely approved public key cryptography algorithms out there. PGP programs utilize the two most popular algorithms\u2014Diffie\u2013Hellman (DH) and Rivest\u2013Shamir\u2013Adleman (RSA), named after their investors and inventors, respectively. DH was one of the first public key algorithms and was originally used by the British intelligence agency in 1969, but it didn\u2019t become a published algorithm until 1975. Two years later, MIT computer scientists Ron Rivest, Adi Shamir, and Leonard Adleman announced RSA.<\/p>\n<h3><b>The start of OpenPGP<\/b><\/h3>\n<p>PGP\u2019s effectiveness and popularity led it to gain some negative attention from the U.S. government. Why? Because PGP didn\u2019t just catch on with Americans, it also spread to countries across the globe. The government believed PGP was a powerful cryptographic software that should be treated as a form of military equipment, thus requiring a license to be exported.<\/p>\n<p>With so many eyes on the program, licensing and patenting issues began to abound\u2014the use of the RSA algorithm was a particularly hot topic. There were also many companies that wanted to develop their own PGP-compatible software. Zimmerman put an end to all of this in 1997 when he asked the Internet Engineering Task Force (IETF) to turn PGP into a defined internet standard. They agreed, and OpenPGP was born, thus allowing anyone to implement the PGP encryption methodology into their software.<\/p>\n<h3><b>How do PGP keys work?<\/b><\/h3>\n<p>While public key cryptography is the backbone of PGP, the program also relies on traditional symmetric key cryptography, hashing, compression, and digital signatures. So how does PGP work as a whole? The process looks like this:<\/p>\n<ol>\n<li><b>Compression:\u00a0<\/b>Plaintext is large and takes up an unnecessary amount of modem transmission time and disc space. A PGP program will compress the user\u2019s plaintext to make the entire process more efficient. This also reduces patterns found in plaintext, making it harder for hackers to decipher.<\/li>\n<li><b>Session Key:\u00a0<\/b>A session key is a one-time only key used to encrypt the compressed plaintext. Encrypted plaintext is known as ciphertext. Session keys rely on traditional, symmetric-key cryptography to encrypt the message because of its speed and efficiency.<\/li>\n<li><b>Public Key Encryption:\u00a0<\/b>This session key, which was used to encrypt the entire message, is then encrypted by the PGP software using the recipient\u2019s public key<b>.\u00a0<\/b>Next, the public key-encrypted session key and ciphertext are sent to the recipient.<\/li>\n<li><b>Private Key Decryption:\u00a0<\/b>The recipient\u2019s PGP software relies on their private key to decrypt the session key, and then uses the decrypted session key to decrypt the ciphertext. Once decrypted, the recipient can clearly read the sensitive information sent to them.<\/li>\n<\/ol>\n<p>There are a few ways to take PGP a step further for those looking to add extra layers of security:<\/p>\n<ul>\n<li><b>Digital Signatures:\u00a0<\/b>Think of digital signatures as harder-to-forge traditional signatures. To create a digital signature, a hash function must first take your plain text and compress it into a message digest. The digest is then encrypted with the sender\u2019s private key. This private key-encrypted digest is the \u201cdigital signature\u201d and can be sent along with the encrypted message. The recipient can then use the sender\u2019s public key to decrypt the digital signature and verify the sender is who they say they are.<\/li>\n<li><b>Digital Certificates:\u00a0<\/b>A digital certificate contains the certificate holder\u2019s public key and other identifying information, including their digital signature. These are third-party credentials and verify the credibility of the certificate holder to confirm a public key is linked to the person you think it is.<\/li>\n<\/ul>\n<h3><b>How do I get my PGP public key?<\/b><\/h3>\n<p>To get a PGP public key you must first download PGP software. Zimmerman\u2019s original PGP Corporation is now owned by Symantec. There are several Symantec products on the market that use PGP encryption practices. These products come with a variety of bells and whistles, and a price tag.<\/p>\n<p>The good news is, you\u2019re not limited to Symantec products if you want an authentic PGP experience. Since the birth of the\u00a0<a class=\"ext\" href=\"https:\/\/www.openpgp.org\/software\/\" target=\"_blank\" rel=\"noopener noreferrer\">OpenPGP standard<\/a>\u00a0we discussed earlier, a number of products that capitalize on PGP have come on the market. The GNU Privacy Guard (GPG) is by far the most common and comprehensive free option out there.<\/p>\n<p>To get your public key you must first select which PGP program you want to download. Each program will have its own process, but generally speaking you will follow this brief PGP tutorial:<\/p>\n<ol>\n<li>Download a PGP program onto your PC or Mac to get started.<\/li>\n<li>Then click \u201cgenerate new key pair\u201d to open the key generation function.<\/li>\n<li>When prompted to select \u201ckey type\u201d choose the program\u2019s default\u2014your options will be HD or RSA, the two most common types of public key encryption methods.<\/li>\n<li>You will then be prompted to add your email and a passphrase. A passphrase is a password comprised of numbers, letters, and characters. The longer the passphrase, the more secure it is. Note that you have the opportunity to change this passphrase at any time.<\/li>\n<li>Once your passphrase is submitted, the program will begin generating your key pair. During this process, the program may prompt you to click your mouse and keys randomly. The goal of this is to create entropy, a form of randomness that can help the software make your key more secure.<\/li>\n<li>Your keys will be ready in just a few seconds. The PGP software will add these keys to your keyrings. Keyrings are files located on your hard drive. You should have one keyring for your private key and another keyring for your public key.<\/li>\n<\/ol>\n<p>Now that you have your public key, how do you share it with others so they can send you sensitive information? There are a few ways to accomplish this. One is to send it directly via email. To do this, simply open your PGP program and either export the key and attach it as a file or copy and paste it into the body of your email.<\/p>\n<p>You can also upload your key to one, or both, of the two public PGP key servers\u2014the PGP Server and the MIT Server. To do this, open your PGP program and select your key. Next find the server menu and hit \u201cSend To.\u201d You will then be prompted to select either PGP or MIT. Choose whichever server you\u2019d like to upload your key to. Remember\u2014anyone can access your public key when its posted on a public server, but that\u2019s OK. In fact, that\u2019s actually the point of the server. What matters is that you keep your private key safe at all times.<\/p>\n<p>In addition to sharing your key with others, it\u2019s good practice to add the public keys of the individuals you send sensitive data to onto your keyring. To do this, import the key\u2014whether it\u2019s been sent to you directly or you\u2019ve found it on one of the public servers\u2014and save it to your keyring (remember, this is simply a file containing public keys).<\/p>\n<h3><b>How do I encrypt a file using PGP?<\/b><\/h3>\n<p>Once you have your pair of keys, you can begin sending and receiving encrypted files. This will involve the same process we outlined above:<\/p>\n<ul>\n<li>Plain text is compressed<\/li>\n<li>A one-time only session key is generated<\/li>\n<li>Session key turns email message into cipher text<\/li>\n<li>Session key is encrypted with the recipient\u2019s public key<\/li>\n<li>Cipher text and encrypted session key are sent to the recipient<\/li>\n<\/ul>\n<p>This sounds complicated, but a PGP software will do the work for you. The exact steps you take will vary depending on your PGP software, but they should look something like this:<\/p>\n<ol>\n<li>Start by crafting the message you\u2019d like to encrypt.<\/li>\n<li>Once you\u2019re finished, place the cursor in the body of your email and open your PGP software from the toolbar.<\/li>\n<li>In the menu of the PGP software, select \u201cCurrent Window\u201d and then \u201cEncrypt.\u201d<\/li>\n<li>You will now be prompted to select the public key of the individual you would like to send your email to\u2014if you\u2019ve saved their public key to your public keyring, it should be here.<\/li>\n<li>Next you\u2019ll enter your passphrase and hit \u201cOK,\u201d thus allowing the program to turn your message into ciphertext within the body of your email. All you need to do now is hit \u201cSend.\u201d<\/li>\n<\/ol>\n<p>The decryption process is similar, only this time you\u2019re using your private key to decrypt a message that has been encrypted by a sender with your public key. Here\u2019s an approximate outline of the decryption process:<\/p>\n<ol>\n<li>Highlight the ciphertext within the email you\u2019ve received.<\/li>\n<li>Open your PCP software from the toolbar.<\/li>\n<li>In the menu of the PGP software, select \u201cCurrent Window\u201d and then \u201cDecrypt.\u201d<\/li>\n<li>Enter your passphrase when prompted and hit \u201cOK.\u201d Decrypted text will appear in your email.<\/li>\n<\/ol>\n<p>While you can\u2019t physically see the inner calculations of your PCP software, rest assured it\u2019s implementing session, public, and private keys to keep your messages secure.<\/p>\n<h3><b>Will PGP protect me from hackers?<\/b><\/h3>\n<p>PGP\u2019s unique combination of public key cryptography, traditional cryptography methods, digital signatures, and certificates all help safeguard sensitive information you send over the internet. But despite its best efforts, there\u2019s still opportunity for hackers.<\/p>\n<p>The transaction of metadata\u2014email address, subject line, message size\u2014is one of the biggest areas of concern. This metadata is transferred as plaintext and can be leveraged by hackers to analyze information about the encryption software and identify the recipient\/sender, allowing them to perform targeted attacks on any system weaknesses they discover. There\u2019s also the possibility of stolen private keys. With a stolen private key in hand, a hacker can decrypt sensitive files sent to the owner of the private key.<\/p>\n<p>For MSPs looking to safeguard their customers\u00a0from security breaches, implementing a threat monitoring software can help. These tools are designed to keep watch over your managed networks and can help you monitor for threats, respond to them, and generate reports that help you stay compliant with the latest security standards. Here\u2019s how SolarWinds Threat Monitor [https:\/\/www.solarwinds.com\/threat-monitor] can complement PGP encryption for more comprehensive security:<\/p>\n<ul>\n<li><b>Log Correlation &amp; Analysis:<\/b>\u00a0Gathering and correlating log data is time consuming. Threat Monitor is designed to automate this process, collecting logs and data feeds in near real-time from your managed networks. It then correlates and normalizes this information so you can identify relationships between ongoing events.<\/li>\n<li><b>Intrusion Detection:<\/b>\u00a0Threat Monitor is designed to pinpoint unwanted traffic and software across your managed networks and systems. It offers 24\/7 monitoring and will alert you as soon as suspicious activity occurs. You can even set alert thresholds so your time isn\u2019t consumed with benign events.<\/li>\n<li><b>Security Automation:<\/b>\u00a0Security automation can help you increase threat detection capabilities and reduce response time by automating complex, repetitive, and error-prone security tasks that may otherwise be performed manually. It\u2019s a great way to protect against any human errors that can lead to cybersecurity breaches.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>PGP (Pretty Good Privacy) is an encryption program used to send highly sensitive information over the internet. It relies on a mix of public key encryption methods as well as&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4951","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding PGP Encryption - N-able<\/title>\n<meta name=\"description\" content=\"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn&#039;t disrupted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding PGP Encryption - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn&#039;t disrupted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-03T21:35:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-30T21:39:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"10\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Understanding PGP Encryption\",\"datePublished\":\"2019-06-03T22:35:48+01:00\",\"dateModified\":\"2021-03-30T21:39:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\"},\"wordCount\":2243,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\",\"name\":\"Understanding PGP Encryption - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-06-03T22:35:48+01:00\",\"dateModified\":\"2021-03-30T21:39:48+00:00\",\"description\":\"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn't disrupted.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding PGP Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding PGP Encryption - N-able","description":"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn't disrupted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption","og_locale":"de_DE","og_type":"article","og_title":"Understanding PGP Encryption - N-able","og_description":"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn't disrupted.","og_url":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-06-03T21:35:48+00:00","article_modified_time":"2021-03-30T21:39:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"10\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Understanding PGP Encryption","datePublished":"2019-06-03T22:35:48+01:00","dateModified":"2021-03-30T21:39:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption"},"wordCount":2243,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption","url":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption","name":"Understanding PGP Encryption - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-06-03T22:35:48+01:00","dateModified":"2021-03-30T21:39:48+00:00","description":"Read about how PGP works and the importance of proper PGP encryption standards so your data communication process isn't disrupted.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/pgp-encryption"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/pgp-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Understanding PGP Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/4951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=4951"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/4951\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=4951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}