Compare commits

..

No commits in common. "bfe3aca5f76c84ed1a6fd20999c8448775492fb4" and "d0ce07d4034b9bbc9ea3a9227819f87ed942b37e" have entirely different histories.

1 changed files with 8 additions and 10 deletions

View File

@ -77,12 +77,12 @@ developed by Phil Zimmermann in the 1990s.
* `gpg --list-keys`
* `echo "super secret text" > test.txt && cat test.txt`
* `gpg --encrypt --recipient <email/ID> test.txt`
* `gpg -er <email/ID> <filename> && cat test.txt.gpg`: notice it's a binary
* `gpg -er <email/ID> <filename> && cat text.txt.gpg`: notice it's a binary
* You can use `--armor/-a` to encode it as ASCII so you can send the encrypted data as text
* `gpg --armor -er <email/ID> test.txt && cat test.txt.asc`
* `rm test.txt && ls`
* `gpg --decrypt test.txt.gpg > test.txt`
* `gpg --decrypt test.txt.asc > test.txt`
* `rm test.txt && ls`: remove original file
* `gpg --decrypt test.txt.gpg && cat test.txt && rm test.txt`
* `gpg --decrypt test.txt.asc && cat test.txt && rm text.txt`
---
@ -143,10 +143,10 @@ developed by Phil Zimmermann in the 1990s.
---
## Basic: On-board generation:
* YubiKey offers generating keys inside of the YubiKey
* Cryptographic attestation keys were never exposed available: https://developers.yubico.com/PGP/Attestation.html
* CON: can't back up the keys
* PRO: simple setup
* YubiKey offers generating keys inside of the YubiKey
* Cryptographic attestation keys were never exposed available: https://developers.yubico.com/PGP/Attestation.html
* CON: can't back up the keys
* PRO: simple setup
---
## Advanced - cold / virtualization
@ -225,8 +225,6 @@ developed by Phil Zimmermann in the 1990s.
## Further Studies
* [pass](https://www.passwordstore.org/): Unix based `gpg` password manager
* [OpenPGP for application developers](https://openpgp.dev/book/): Deep dive on OpenPGP
* [Sequoia](https://sequoia-pgp.org/): alternate OpenPGP implementation in rust