On 07/12/2013 12:54 AM, Olav Seyfarth wrote: > Well, depends. I do not want to use my main key on my smartphone. I > created a > smartphone key (but rarely use it). For signatures it is maybe not so important, but what if you get an important, encrypted, email? Then you will be unable to read it on your phone unless the sender also encrypted it with your phone key. > For the usecase you describe, mailing the main key symmetrically > encrypted would > be easier than creating and deleting a temporary key. This was my first idea also, but sadly symmetric crypto is not a standard feature in many PGP user interfaces. But I realized now that the private key is actually always symmetrically encrypted, right? Personally I usually don't use a long passphrase (because I see it as unlikely that anyone will go through the effort of obtaining my private key from my device), but certainly when sending the private key over the wire this would be necessary. Maybe Enigmail could prompt the user to change the key password when it is sent by email and recommend a really long passphrase (as it is only needed twice). The user would then just need to change the password back to something reasonable after receiving the key. > You could also send the key as password protected ZIP (AES, not ZIP > 2.0 ...). This isn't an option really, since it would spell trouble for "dumb" devices like Android where you probably can't assume support for such fancy things.
> > 7. Import your main keypair that you saved in step 5. > You'd also have to add trust to that key after importing it. Ah, right. Forgot about that. Thanks. -- Stefan Parviainen _______________________________________________ enigmail-users mailing list [email protected] https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net
