Recently, on a certain site, a database was posted for sale featuring 3.8 billion phone numbers leaked from the popular app Clubhouse. This database not only includes the phone numbers of the app's users but also of the user's contacts list. The database by itself is mostly harmless though, as the only fields it contains are the numbers themselves. There doesn't seem to be any attached information like names or addresses. It will be interesting to see if more information shows up in another post. If one person or group is able to extract phone numbers, it reasons that others may be able to extract further information.
PGPy is a library for python that enables the creation, storage, and encryption/decryption of PGP keys and files in python. Recently, in a small project to reacquaint myself with python, I used PGPy for key generation and encryption and decryption. That project can be found in my github at https://github.com/lpowell . The goal of the project was to use command-line switches to control the program, and to provide basic encryption and decryption capabilities, along with rot13 and base64 encoding. First, to load in a key use key, _ = pgpy.PGPKey.from_file(keyfilename) . This loads the key from either a binary or ASCII armored file. You can swap out .from_file for .from_blob , if you plan on using a key stored in a string or bytes object rather than a file. In my example code, I pull the key from a file, as I found it to be the simpler method. Next, you'll need to open a file or create a string or bytes object that contains the message you wish to encrypt. We'll call this file