On Fri, 14 Apr 2017 14:37:17 -0400
Chris Hoogendyk <[email protected]> wrote:

> I think that's it. Relatively simple once you get it. Hope I didn't
> miss documenting any steps.

Looks good. I like locking down the keys to a specific executable.

I don't see where you generated the client's keys, or copied its public
key to the server. Those steps should be between steps 4 and 5 on the
client.

And if you want to run amrecover on the client, you will need to
copy user backup's public key from the client to the server.


-- 

The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be seized.
-- U.S. Const. Amendment IV

Key fingerprint = CE5C 6645 A45A 64E4 94C0  809C FFF6 4C48 4ECD DFDB

Reply via email to