Hardware Reference
In-Depth Information
Postgeneration maintenance
In order for people to send you encrypted messages, they need to know your public key.
Having your public key server can help distribute your public key. You can post your key
as follows, and replace the fingerprint with your primary key ID:
gpg --send-keys 0xABD9088171345468
Note
GPG does not rely on third parties and expects you to perform key management. To ease
this burden, the OpenPGP standards define the Web-of-Trust as a mechanism to verify oth-
er users' keys. Details on how to participate in the Web-of-Trust can be found in the GPG
Privacy Handbook at https://www.gnupg.org/gph/en/manual/x334.html .
You are also going to want to create a revocation certificate. A revocation certificate is
needed when you want to revoke your key. You would do this when the key has been com-
promised, say if it was stolen. Or more likely, if the BBB fails and you can no longer ac-
cess your key. Generate the certificate and follow the ensuing prompts replacing the ID
with your key ID:
gpg --output revocation-certificate.asc --gen-revoke
0xABD9088171345468
sec 4096R/0xABD9088171345468 2014-06-06 Tyrone Slothrop
<tyrone.slothrop@yoyodyne.com>
Create a revocation certificate for this key? (y/N) y
Please select the reason for the revocation:
0 = No reason specified
1 = Key has been compromised
2 = Key is superseded
3 = Key is no longer used
Q = Cancel
(Probably you want to select 1 here)
Your decision? 0
Enter an optional description; end it with an empty line:
>
Reason for revocation: No reason specified
Search WWH ::




Custom Search