On Fri, 14 Apr 2017 14:37:17 -0400 Chris Hoogendyk <[email protected]> wrote:
> I think that's it. Relatively simple once you get it. Hope I didn't > miss documenting any steps. Looks good. I like locking down the keys to a specific executable. I don't see where you generated the client's keys, or copied its public key to the server. Those steps should be between steps 4 and 5 on the client. And if you want to run amrecover on the client, you will need to copy user backup's public key from the client to the server. -- The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. -- U.S. Const. Amendment IV Key fingerprint = CE5C 6645 A45A 64E4 94C0 809C FFF6 4C48 4ECD DFDB
