<p>Use the following command to export your secret key so you can import it into your email client at the next <a href=#section3>step</a>. To avoid getting your key compromised, store this in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Exporting your keys can be done with the following commands:</p>
<span style="color:#2f5faa; font-family: monospace;">
-$ gpg --export-secret-keys -a keyid > my_secret_key.asc<br>
-$ gpg --export -a keyid > my_public_key.asc<br>
+$ gpg --export-secret-keys -a [keyid] > my_secret_key.asc<br>
+$ gpg --export -a [keyid] > my_public_key.asc<br>
</span><br />
<br />
<p>Just in case you lose your key, or it gets compromised, you want to generate a certificate and choose to save it in a safe place on your computer for now (please refer to <a href="#step-6c"> step 6.C</a> for how to best store your revocation cerficate safely). This step is essential for your email self-defense, as you'll learn more about in <a href="#section5">Section 5</a>.</p>
<p># Copy your keyID <span style="color:#2f5faa; font-family: monospace;">gnupg --list-key [your@email]</span> will list your public ("pub") key information, including your keyID, which is a unique list of numbers and letters. Copy this keyID, so you can use it in the following command.</p>
-<p># Generate a revocation certificate: <span style="color:#2f5faa; font-family: monospace;">gpg --output revoke.asc [keyID]</span></p>
+<p># Generate a revocation certificate: <span style="color:#2f5faa; font-family: monospace;">gpg --gen-revoke --output revoke.asc [keyID] [keyID]</span></p>
<p># It will prompt you to give a reason for revocation, we recommend to use <span style="color:#2f5faa; font-family: monospace;">1 "key has been compromised"</span></p>
<p># You don't have to fill in a reason, but you can, then press enter for an empty line, and comfirm your selection.</p>