You are here |
blog.zespre.com | ||
| | | |
www.linux.it
|
|
| | | | Here are my notes about copying PGP keys to external hardware devices such as Yubikeys. Let me begin by saying that the gpg tools are pretty bad at this. MAKE A COUPLE ... | |
| | | |
danielpecos.com
|
|
| | | | Tutorial on how to generate a new PGP / GPG key pair and properly rotate from your old one. | |
| | | |
danielpecos.com
|
|
| | | | Guide on how to participate on a PGP / GnuPG key signing party and how to prepare to get the most of it | |
| | | |
willhaley.com
|
|
| | You can automatically unlock and mount LUKS encrypted volumes at boot by specifying the volumes and their keys in /etc/crypttab. For the sake of this article, I am working with non-critical volumes. Volumes for storage. Not volumes required to boot your machine properly. I am not discussing how to mount an encrypted root volume. I like to keep my keyfiles on USB drives. You do not need to use a USB device to unlock your volumes, but it is a bit silly to keep the key on a permanent disk connected to your machine, right? |