-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 You don't communicate with paperkey. You use GPG to communicate. GPG uses the secret key to sign messages as well as decrypt messages that were encrypted with its corresponding public key. Paperkey is just a tool to help store that secret key on a paper medium. That's it. To use it, use the following command: gpg --export-secret-keys | paperkey You can print the contents out, type them by hand, or whatever.
I think what you're asking is: "How do I sign or decrypt messages without crypto software such as GPG on the compromised computer? I don't want to risk my secrets being exposed!" To that, my answer is "you can't." If your machine is compromised then your best bet is to keep your secret keys away from that machine entirely. Instead, install GPG on your offline machine and do all of your signing/decryption there. To sign messages in PGP ascii armored format, you can do: gpg --clearsign inputfile or gpg --detach-sign --armor inputfile Similar commands can be used for encryption. Remember that when encrypting that if you don't include yourself as the recipient, you won't be able to decrypt it. Here is a good tutorial for GPG and enigmail: https://futureboy.us/pgp.html -----BEGIN PGP SIGNATURE----- iLgEARMKAB0WIQQWZv6JZKxO310TWtXo8fj9gx4T0wUCXOrRTgAKCRDo8fj9gx4T 09gBAgjtjxZGTdQPV46chrDyOKSN9xDxrEubNgvlao8mXRaJ/+nLc90lbe69aztD b7WeVx9wzXzIBCNi/sbYa50S/4PWMAIJAUAS17I/mBNzFE2KYEJm1erzXvRixc15 jCvovUDGuYFU7AtLW65iPpJMMTjIfP3uX/aw+1mDbEkJoJ7+yblti6DY =8Q6Q -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users