Explore >> Select a destination


You are here

blog.zespre.com
| | www.linux.it
13.1 parsecs away

Travel
| | Here are my notes about copying PGP keys to external hardware devices such as Yubikeys. Let me begin by saying that the gpg tools are pretty bad at this. MAKE A COUPLE ...
| | danielpecos.com
12.6 parsecs away

Travel
| | Tutorial on how to generate a new PGP / GPG key pair and properly rotate from your old one.
| | danielpecos.com
9.4 parsecs away

Travel
| | Guide on how to participate on a PGP / GnuPG key signing party and how to prepare to get the most of it
| | willhaley.com
142.4 parsecs away

Travel
| You can automatically unlock and mount LUKS encrypted volumes at boot by specifying the volumes and their keys in /etc/crypttab. For the sake of this article, I am working with non-critical volumes. Volumes for storage. Not volumes required to boot your machine properly. I am not discussing how to mount an encrypted root volume. I like to keep my keyfiles on USB drives. You do not need to use a USB device to unlock your volumes, but it is a bit silly to keep the key on a permanent disk connected to your machine, right?