On Mon, Feb 27, 2006 at 02:06:57PM +0100, Raphaƫl Poss wrote:

> Q1. how do you think other software (PGP, old GPG, ...) behave when they 
> see multiple encryption public subkeys?

Unless it's really old PGP (say, PGP 5.0 era) it'll work fine.

> Q2. will signatures on other keys made with the laptop be recognised by 
> other software? Is there anything I should care for w.r.t trust when I 
> sign keys?
> 
> Q3. do you think it is better I do not entrust the laptop subkey to sign 
> other keys?
>
> For that last question I have to state the difference between the 
> windows workstation and the laptop: the laptop is "more" secure than the 
> workstation. If the laptop is compromised I would know about it 
> immediately, and issue any relevant revocation certificates straight 
> away. Any encrypted data on the laptop is deleted securely after I have 
> decrypted it.

All this is somewhat moot, as you cannot make key signatures with a
subkey.

> Q4. How can I mark my level of trust for the different subkeys using gnupg?

You can't.  The concept of trust is a whole-key concept.

David

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to