Tar it up and symmetrically encrypt it. Use a strong pass phrase. Store the encrypted tar file in various places (USB, gmail, bank safety deposit box, lawyers office, girlfriend's house, etc.) Write the pass phrase down and keep it in your bank box.
I (personally) don't do this. I just tar up .gnupg with no symmetric encryption. In theory, this is a bad idea. With a good pass phrase however, in practice, there is nothing wrong with it. The weak link is the pass phrase, so use a good one and don't worry too much. Brad On Jan 24, 2008 8:38 AM, Steven Woody <[EMAIL PROTECTED]> wrote: > hi, > > When one day my hardisk go bad and I can not access my keys, theose > files I encrypted for myself would never be opened for me. I don't > want that, then I believe I need to make a copy of my keys ( the whole > of ~/.gnugp directory, right? ). But where should I keep the copy? > It gets chance exposuring to public if I put in on a USB disk. I like > to hear what the method you used. > > thanks. > > -- > woody > > then sun rose thinly from the sea and the old man could see the other > boats, low on the water and well in toward the shore, spread out > across the current. > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users