Explore >> Select a destination


You are here

collantes.us
| | alexcabal.com
28.6 parsecs away

Travel
| | [AI summary] The provided text is a collection of user comments and discussions from a forum or blog post about using GnuPG (GPG) for secure communication. The main topic revolves around generating and managing cryptographic keys, particularly focusing on the use of master keys, subkeys, and key management practices such as secure deletion and exporting keys. The comments include discussions on key generation, key usage, keyserver interactions, and troubleshooting issues related to GPG operations. Some users also mention specific tools like Enigmail, Thunderbird, and the importance of secure key storage and deletion. The overall context is about best practices for key management and encryption in the context of digital communication security.
| | sergioprado.blog
4.5 parsecs away

Travel
| | In this article, we will learn how asymmetric-key encryption and digital signatures work from a practical perspective.
| | willhaley.com
1.3 parsecs away

Travel
| | Encrypt and Decrypt a Single File on Linux with AES256 and GPG Encrypt gpg --cipher-algo AES256 --symmetric --output encrypted.file plain.file Decrypt gpg --output plain.file --decrypt encrypted.file Change the key file for a LUKS device cryptsetup luksChangeKey /dev/sdX --key-file /keys/old.keyfile /keys/new.keyfile Create a LUKS Encrypted Image Container File Create an empty 1GB img file dd if=/dev/zero of=encrypted.img bs=1 count=0 seek=1G Choose a keyfile that will be used to encrypt and unlock the image. Any regular file works as a key. A random key can be generated like so.
| | fedd.it
26.8 parsecs away

Travel
|