On 07/12/2013 12:54 AM, Olav Seyfarth wrote:
> Well, depends. I do not want to use my main key on my smartphone. I
> created a
> smartphone key (but rarely use it).
For signatures it is maybe not so important, but what if you get an
important, encrypted, email? Then you will be unable to read it on your
phone unless the sender also encrypted it with your phone key.
> For the usecase you describe, mailing the main key symmetrically
> encrypted would
> be easier than creating and deleting a temporary key.
This was my first idea also, but sadly symmetric crypto is not a
standard feature in many PGP user interfaces. But I realized now that
the private key is actually always symmetrically encrypted, right?
Personally I usually don't use a long passphrase (because I see it as
unlikely that anyone will go through the effort of obtaining my private
key from my device), but certainly when sending the private key over the
wire this would be necessary. Maybe Enigmail could prompt the user to
change the key password when it is sent by email and recommend a really
long passphrase (as it is only needed twice). The user would then just
need to change the password back to something reasonable after receiving
the key.
> You could also send the key as password protected ZIP (AES, not ZIP
> 2.0 ...).
This isn't an option really, since it would spell trouble for "dumb"
devices like Android where you probably can't assume support for such
fancy things.

> > 7. Import your main keypair that you saved in step 5.
> You'd also have to add trust to that key after importing it.
Ah, right. Forgot about that. Thanks.

-- 
Stefan Parviainen

_______________________________________________
enigmail-users mailing list
[email protected]
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to