Convert PGP key to X.509?
Can I convert a PGP key to X.509, using OpenSSL or GNUPG?
Aren’t these only container/wrapper formats?
Collaborate Disseminate
Can I convert a PGP key to X.509, using OpenSSL or GNUPG?
Aren’t these only container/wrapper formats?
Apparently, there are some problems with the new defaults that are set when one creates a PGP key using a recent version of GnuPG (2.4).
I ran into this after generating a new ECC/ED25519 key to replace my "old" RSA one. The prob… Continue reading Should one really disable AEAD for recent GnuPG created PGP keys?
I’ve been looking around for smart cards with support for Ed25519. More specifically, I’d like to have a TLS CA with the private key on a YubiKey. The latest YubiKey 5 supports secp256k1, secp384r1, and RSA 2048 in the PIV tool for storing… Continue reading Can I Use an OpenPGP Smart Card to Sign a TLS Certificate?
In order to keep all my secret in the same place, I would like to store my GPG private key in KeePassXC, under the "Notes" field.
Provided that the db file has very good password, is this safe?
Os this field encrypted?
How can we ensure the best practice with mail pgp when the recipient is not using it?, so when Bob send the vary first email to Alex, Bob signing and encrypted it?
Q1. In that case, Is Alex able to read the message? With signing and encrypting the mail, how doe those two steps help Bob in the first place comparing to just address, content to alex@example.com?
Found this question, but not sure what exactly we need to do
Hypothetically, I’d like to demonstrate that I am the owner of a piece of published information. The requirements are the following.
The hash/ characteristic string is compact enough (ideally a few bytes, say 16 or 32.)
It does not expose… Continue reading What’s the shortest message you need to claim ownership of another message?
I recently consolidated some of my independently GPG keys.
I used the following the command to edit the oldest key
gpg –expert –edit-key <oldest-keygrip>
gpg> add-key –keygrip=<another-keygrip>
After that I exported and … Continue reading Why does the fingerprint of a GPG key change after it is made a sub key?
Out of the blue Kleopatha just refuses to open, I have dug through the internet and found nothing that works. I ran it as an admin and for some reason it shows in task manager that its there but nothing pops up for me at all as if I never … Continue reading Kleopatra won’t open [migrated]
The primary secret key should be stored offline and only be used for creating/signing keys.
There will be at least two secret keys: one primary key or subkey for signing, and one subkey for encryption; there might be a third key for author… Continue reading Which PGP fingerprint to share/publish as my digital identity?
Can we be sure that a cleartext message that becomes encrypted by pgp or openpgp which is intended for one-or-more specific recipients doesn’t also get secretly decipherable by a third party? Since i understand we can target multiple recip… Continue reading Can secret recipients be included in PGP cryptography