This page describes how to GPG encrypt and then forward all incoming mail.
It should work with any modern UNIX that supports .forward.
In particular, this page describes how to GPG encrypt and forward to user@example.org
using an already generated GPG key.
First, import your public GPG key (note: your private key should not be copied!) and check it is imported:
$ gpg --import <pubkey.asc
$ gpg --list-keys
# note the key id: e.g, ABCD1234
Next create a forwarding script
$ mkdir -p $HOME/bin
$ cat >$HOME/bin/gpg-forward <<EOF
(echo To: user@example.org;
echo Subject: message from \$(hostname) at \$(date);
echo;
gpg --trust-model always -ear ABCD1234) | sendmail -t
EOF
$ chmod +x $HOME/bin/gpg-forward
Create the .forward file and pip it to the above script
$ cat >$HOME/.forward <<EOF
|$HOME/bin/gpg-forward
EOF
Finally, test it! After this, you should receive an appropriately encrypted message
to user@example.org (or whatever you replaced it with):
$ mail $USER
Subject: test
testing
.
EOT
Note, if you have problems, you can run $HOME/bin/gpg-forward directly to
observe any warnings or errors.