Am Sa 03.08.2013, 12:16:56 schrieb ix4...@gmail.com:

> On 30 July 2013 22:30, <ix4...@gmail.com> wrote:

> > I only need one GPG identity for now. I also use GPG on devices of two
> > classes: "Secure" and "insecure". I would like to take some operational
> > security (OPSEC) precautions to minimize my pain when my insecure devices
> > get compromised.

You should consider using two keys for the same identity and very obviously 
give them different security levels.  IMHO that's what we all are going to do 
in five years.

Then the sender can decide how confidential the information is (or how 
reliable the signature must be).


> > 2. Export the full keyring and keep it somewhere safe (on a few offline
> > systems).

There is no need to export the keyring. Just export the whole key:

gpg --armor --export-secret-keys 0x12345678 > 0x12345678.secret-mainkey.asc

export the subkeys only

gpg --armor --export-secret-subkeys 0x12345678 > 0x12345678.secret-subkeys.asc

delete the secret keys

gpg --delete-secret-key 0x12345678

and import the subkeys only

gpg --import 0x12345678.secret-subkeys.asc


It's not important where you store the offline mainkey. You may even put it on 
your web site. Just make sure that your passphrase is cryptografically safe 
(16+ chars [a-zA-Z0-9] and never entered on an insecure system).


> > 3. Create a "insecure" keyring with the original signing subkey missing
> > (as described in https://alexcabal.com/creating-the-perfect-gpg-keypair/ )

To me this seems to be a really strange article. My advise is to ignore that.


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/bekannte/
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to