Werner Koch wrote:
It is possible to read out the public key, though. However it does
not help you much because these are only a few numbers without any
other information. When gpg generated the key on the card it also
created this other data and stored it in your regular keyring on
disk. If y
e output:
[EMAIL PROTECTED]:~$ gpg very_secret.gpg
gpg: encrypted with 2048-bit RSA key, ID , created -XX-XX
"Another Person <[EMAIL PROTECTED]>"
gpg: encrypted with 1024-bit RSA key, ID 37BDF910, created 2005-09-21
"Patrick Plattes (Mr. Parity) <[EMAIL PROTECTED]>
Realos wrote:
hello,
I have found an old pair of private and public keys but unfortunaltely
do no remember the corresponding password. Public key is places on key
servers, thus I would like to have access to it's password again.
What would you suggest in this case? A brute force attack with so
Atom Smasher wrote:
has anyone given any thought to what would be the difference between
carefully and carelessly making hard-copy backups of secret keys?
i mean, it would be stupid to print a copy of ones secret key (with a
weak passphrase) and leave it lying on a table next to a window. OTO