Hey all,

Building debs for ppa uses gpg and signs each source package build in
two different places requiring the unlocking of the gpg key twice.

I've been running a script which builds 4 packages for 3 ubuntu releases
which comes to typing in my gpg passphraise 24 times in succession (more
if I get it wrong).

Should I be concerned that possible snoopers have 24 opportunities to
watch my passphraise in physical space? And if typing in the passphraise
a lots of times isn't important, why have a passphraise at all?

Isn't this sort of problem what timed keyrings are for?

Thoughts?

Martin,


-- 
To UNSUBSCRIBE, email to debian-mentors-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1284875897.30010.9.ca...@delen

Reply via email to