gnupg¶
Add below in .bashrc before you doing anything else¶
Print Version¶
Test Clearsign¶
Print keyID (we need for mutt)¶
Easier way to get keyid¶
Short key behind sub¶
Long key¶
Generate a new key¶
List keys¶
List keys¶
List the keys in your secret key ring:¶
Export gpg key¶
Import keys¶
This will produce an encrypted file, secret.txt. gpg, that can only be decrypted by the recipient¶
Decrypting a file¶
Create a tarball and encrypt it¶
Decrypt and untar¶
gpg -d foo.txt.tar.gz.gpg | tar xzvf -
```sh
#### Encrypt file using a shared key. You will be prompted for a passphrase.
```sh
gpg -c secret.txt
Sign a file¶
Import keys from keyserver¶
Upload keys to keyserver¶
Request updates from keyserver for keys already in your keyring¶
Search keys from keyserver:¶
Override keyserver from ~/.gnupg/
to gpg.conf
¶
Only merge updates for keys already in key-ring:¶
Trusting a key¶
Create a text file with the your messagage, save it to test.txt. Now we want to manual sign it¶
After entering password, we will get a new file named text.txt.asc, its signed, now we also want to verify this¶
For encrypt our file¶
For decrypt our file¶
Send key to key servers¶
Backup Key¶
Restore Backup¶
Get some more info then keyid¶
Get keyid¶
Delete key¶
Last update: August 10, 2022
Created: August 10, 2022
Created: August 10, 2022