Yes! All the encryption happens on your computer (and or your phone) and
you have complete control of the process.
The flip side of this is you are responsible for the whole process. There
are *many* ways to go about this for different
people in different situations. Here is just one option.
* mak
using openkeychain with a yubikey nfc is totally solid, and convenient.
I've been using them for years. they also plug into the bottom of the
phones which some people prefer.
On Tue, Dec 11, 2018, 10:14 AM Damien Goutte-Gattat via Gnupg-users <
gnupg-users@gnupg.org wrote:
> On Tue, Dec 11, 2018
for years I've been using openkeychain and keeping a signing and encryption
subkey on an nfc yubikey. when I went to use encrypted email on the phone
(which is basically only from Facebook) I tap the key to the back of the
phone. if I want to read the same email on my laptop I plug out in there.
i
I had exactly the same problem, and there is an open bug about this (wanna
fix it?) I forgot the number.
I tried to solve it first by creating three copies of the master key. One
that knew about both signing keys, and one independent copy that knew about
each of the signing keys. So I could switch
So you weren't alike if you can do this (yes it works) rather you where
asking if you should ;-)
A hash of The message passes through near field magnetic induction which
does emit radio waves. Then a response is sent back containing the
description key for that message. Perhaps someone here knows
Yes it works great, I do this with k9+openkeychain on Android
Den tor. 9. feb. 2017 09.27 skrev Adam Sherman :
> Good Morning,
>
> As a very happy Yubikey 4[2] user, where my latop does not contain any
> secret keys, I would now like to enjoy secure email on my smart phone
> and tablet(s). Enter
I have a similar setup and have been doing it successfully. I have two
yubikey neos with signing keys. I found that because of bugs in gpg 2.1 I
had to put the same signing key onto both neos. Once I did that it worked
smoothly. It would be preferable to use different keys and I'll do that if
these
I'm not sure I totally understand your requiremens, though if you are
looking to run RSA encryption on strings and are not using any of the
authentication parts of gpg, then openssl is the way to go. I suspect it's
not possible with gpg's provided interface.
If using pgp is really more convenient
When setting this up I missed the step of explicitly enabling ssh agent
mode in gpg agent so it would listen for connections from ssh (and pretend
to be the ssh agent) then I had to set the environment variable for the ssh
socket to the gpg agent socket. After a short while this grew tedious and I
I am having the same problem. The only way to make it see the key on
the new card that I have come across is to completely remove the
entire .gnupg directory and not restore any of it, then import the
public key and only then run gpg --card-status.
If I don't completely wipe everything out (includ
with the old key:
~ ยป gpg --card-status
arthur@a:13:32:50
Reader ...: 1050:0111:X:0
Application ID ...: D27600012401020603634622
Version ..: 2.0
Manufacturer .: Yubico
Serial number : 03634622
Name of cardholder: Arthur Ulfeldt
Language prefs ...:
11 matches
Mail list logo