Hi!
Just for the records
> Oh, I didn't know, I was advised yesterday on another irc channel
> (#debian-facile) to change my key server:
>
> "They were ('keys.gnupg.net' and others) all flooded with fake keys
> mid-2019
You can't talk about fake key on a keyserver. That is not the task of a
key
On Wed, 16 Mar 2022 16:22, Schultschik, Sven said:
> There must be a possibility to proper kill the pinentry
gpg-agent closes the pinentry or kills it on timeout. You need to
properly restore your tty in case the used curses version does not act
correctly or the pinentry died.
Salam-Shalom,
Thanks, that does work, but is is also possible to set an empty
passphrase i.e. remove the passphrase with this method?
Best,
Daniel
Am Do., 17. März 2022 um 10:26 Uhr schrieb Werner Koch :
> On Wed, 16 Mar 2022 09:26, Daniel Kilimnik said:
>
> > mode. With --pinentry-mode loopback --passphrase-
On Wed, 16 Mar 2022 09:26, Daniel Kilimnik said:
> mode. With --pinentry-mode loopback --passphrase-fd 0 activated. It asks
> for my current passphrase, but then exits with a success.
--passphrase-fd works only if a password is request but not if two
passwords are quested (the old one and the new