Stephan Beck said:
> Am 16.06.2015 um 15:50 schrieb A.T. Leibson:
> 
> > Lastly, what's your favorite noob-friendly guide, and why?
> 
> I think that the guide available at (1)
> 
> (1) https://emailselfdefense.fsf.org/en/

Potential instructors: please explain subkeys and how it might be best to 
primarily use subkeys on your computer, tablet etc...

#5 USE IT WELL
...
IMPORTANT:
ACT SWIFTLY IF SOMEONE GETS YOUR PRIVATE KEY
If you lose your private key or someone else gets ahold of it (say, by stealing 
or cracking your computer), it's important to revoke it immediately before 
someone else uses it to read your encrypted email. This guide doesn't cover how 
to revoke a key, but you can follow the instructions on the GnuPG site. After 
you're done revoking, send an email to everyone with whom you usually use your 
key to make sure they know.
The text links to https://www.gnupg.org/gph/en/manual.html#AEN305


If I were to use the instructions and followed the link, I would say, what are 
subkeys?  And have no clue about keeping which keys or subkeys where...

Proper training should include the processes to recover a loss of a private 
subkey without losing all your key signings.

The best HowTo on subkeys I have seen, but not really noob-friendly if you want 
to avoid the command line:
https://wiki.debian.org/Subkeys


Thanks,
Chuck   


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to