Using gpg
Tue 13 January 2015
GPG is used to perform encryption and signing of email and data. here are a few tips if you use gpg.
- Create NEW gpg key
gpg —gen-key - Create a revocation certificate
gpg —output revoke.asc —gen-revoke - Listing keys ǐ
gpg —list-keys - Get keys from server
gpg —keyserver keyserver.argoss.nl —recv-key - Send keys to server
gpg —keyserver keyserver.argoss.nl —send-key - Encrypt Document
gpg —output doc.gpg —encrypt —recipient sander.hulst@bmtargoss.com doc - Decrypt Document
gpg —output doc —decrypt doc.gpg - ClearSign Document
gpg —clearsign doc - Detached Signature
gpg —output doc.sig —detach-sig doc - Verfiy Detached doc
gpg —verify doc.sig doc - Edit your own key
gpg —edit-key @bmtargoss.com - Search for keys
gpg —keyserver keyserver.argoss.nl —search-keys bmtargoss.com - Retrieve keys
gpg —keyserver keyserver.argoss.nl —recv-keys Sending a binary over email: Before sending:
gpg —enarmour < > .asc After Recieving:
gpg —dearmor < .asc > file.bin > Really cool way to tar and encrypt at the same time: $ tar -cf - | gpg -c > encrypted_archived_files.tgp And to get them back gpg < encrypted_archived_files.tgp | tar -xvf - The Rest you can find here: External Link