-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 El 03-04-2017 a las 20:04, Will Senn escribió: ... > Actually, I appreciate all of the detail. I will start off with a > simple keypair that I am careful with. Based on my current > understanding, if my passphrase is known only to me, is > sufficiently long and unique, if I keep my secret key reasonably > secure, and keep it local to my own devices, I should be reasonably > safe from exploit against all but the most determined folks.
You may also want to set an expiration date for your keys (in case you lose the private keys and revocation certs... let's say they were on the same hdd and it crashed), which can be edited later (only problem is your correspondents will need to get an updated copy of your public key to still be able to use your key). You can also export your keys using paperkey utility, that way you can print them in an easy to type (maybe even easy to OCR) way and store the printed version in a safe place. I don't really care that much about my signing key, but if my hdd crashes and I need to use my remotely stored backups... I'll need my encryption key to open them. Best Regards -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBCAAGBQJY5CU5AAoJEMV4f6PvczxAI8EIAKiYCeQoNwO8qG+BhYa/th2C ZpBctqO+uPWKuAJz40WoL6Adqn29KquI/L33TBJ+m5IOKklldtevSTgjXU7649+Q jy5IBhSl1qhxtetiK+yzKNGFYcZ96QZNUU0U9CJIIriV57+BPIsf3kynS/wfM2P5 jQcZdLcHUkLku6WtdANNsXfHqo7fMvw+6Tfxw+rIBFPcyHonrXKKdpBuTDxdYFst HyHhXb6hhFqurOCcKyKpGlFecfvt+0V6O4923xvQdBYIq/yBfLGU18O8OCmU6c2b PkZcJgA+D+0V5LbOus3IAROY+14SS8o+q7gEpOnT61qhCqF1v0weCDw8AxGc8JM= =E8Zl -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users