Am 19.02.21 um 13:10 schrieb Andrew Gallagher via Gnupg-users:
> On 19/02/2021 11:06, michaelof--- via Gnupg-users wrote:
>> Hi all,
>>
>> published a revocation cert for a very long used old 1024 bit key plus a
>> newly created 4096 bit key to http://keys.gnupg.net/. Visible after some
>> minute
On 19/02/2021 11:06, michaelof--- via Gnupg-users wrote:
Hi all,
published a revocation cert for a very long used old 1024 bit key plus a newly
created 4096 bit key to http://keys.gnupg.net/. Visible after some minutes.
Now, four days later, both keys are still not visible on e.g.
https://pgp.
Hi all,
published a revocation cert for a very long used old 1024 bit key plus a newly
created 4096 bit key to http://keys.gnupg.net/. Visible after some minutes.
Now, four days later, both keys are still not visible on e.g.
https://pgp.ocf.berkeley.edu
Is this usually taking that long, or is
On Donnerstag, 18. Februar 2021 22:35:16 CET Luke via Gnupg-users wrote:
> Now in the case of multiple device, not using subkeys would mean
> creating different keypais, and different identities, which doesn't
> sound nice, right?
I think Andrew's suggestion to use a hardware token is good advice.
Hi, Luke.
My personal experience is that a hardware device such as an OpenPGP card
or Yubikey is the easiest way to share the same private key across
multiple devices (assuming you have physical access, see below). You
designate one machine your master, where you store your original key
mater