gpg explained

preview_player
Показать описание
Difference between pgp and gpg. How to use pgp instead of ssh. Public and private keys. Primary key and subkeys. Signing, encrypting and authenticating. Expiration, identity and revocation. Everything a developer should know about gpg.

0:00 Introduction
1:50 Asymmetric cryptography
4:20 gpg, PGP, GnuPG and OpenPGP
5:20 Is GPG ideal?
6:10 GPG key structure
7:20 Generating gpg key
13:30 Generating subkeys
20:00 Backing up keys
24:55 Importing keys
28:30 Sharing/publishing and retrieving keys
32:25 gpg key and gpg-agent instead of ssh key and ssh-agent
39:00 Conclusion and some notes

#gpg #rde

IRC and Matrix Chat:

org file with notes and links:

Repository with configs:

Other tags:
#gnu #linux #guix #gnupg
Рекомендации по теме
Комментарии
Автор

This topic is important for reproducible development environment. It's one of the places, where you can't rely on reproducibility and have to know how to manage your private keys yourself.

abcdw
Автор

0:00 Introduction
1:50 Asymmetric cryptography
4:20 gpg, PGP, GnuPG and OpenPGP
5:20 Is GPG ideal?
6:10 GPG key structure
7:20 Generating gpg key
13:30 Generating subkeys
20:00 Backing up keys
24:55 Importing keys
28:30 Sharing/publishing and retrieving keys
32:25 gpg key and gpg-agent instead of ssh key and ssh-agent
39:00 Conclusion and some notes

abcdw
Автор

Very well done. Thanks. You gave me the explanation I was searching for.

smibssmibs
Автор

To improve entropy story, one can install haveged service before generating keys.

kossmaas
Автор

what about using a yubikey to access to a remote server (not github) from windows command prompt?

ethanweatherhead
Автор

Is it safe to store the key backups in the cloud but encrypted with symmetric encryption, e.g. gpg --symmetric?

KatarDan
Автор

Please stop this vocal fry, it's very difficult to follow. You do great job, so don't be shy to use your normal voice!

ymatsiuk