<h4>Export your key to a file</h4>
<p>Use the following command to export your secret key so you can import it into your email client at the next <a href="#section3">step</a>. To avoid getting your key compromised, store this in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Exporting your keys can be done with the following commands:</p>
-<p>
-<code>$ gpg --export-secret-keys -a [keyID] > my_secret_key.asc</code>
-<code>$ gpg --export -a [keyID] > my_public_key.asc</code>
-</p>
+<p><code>
+$ gpg --export-secret-keys -a [keyID] > my_secret_key.asc<br/>
+$ gpg --export -a [keyID] > my_public_key.asc
+</code></p>
<h4>Generate a revocation certificate</h4>
<p>Just in case you lose your key, or it gets compromised, you want to generate a certificate and choose to save it in a safe place on your computer for now (please refer to <a href="#step-6c"> step 6.C</a> for how to best store your revocation cerficate safely). This step is essential for your email self-defense, as you'll learn more about in <a href="#section5">Section 5</a>.</p>
<dd>
<p>Use the following commands to transfer your keys. To avoid getting your key compromised, store it in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Importing and exporting a key can be done with the following commands:</p>
-<p>
-<code>$ gpg --export-secret-keys -a [keyID] > my_private_key.asc</code>
-<code>$ gpg --export -a [keyID] > my_public_key.asc</code>
-<code>$ gpg --import my_private_key.asc</code>
-<code>$ gpg --import my_public_key.asc</code>
-</p>
+<p><code>
+$ gpg --export-secret-keys -a [keyID] > my_private_key.asc<br />
+$ gpg --export -a [keyID] > my_public_key.asc<br />
+$ gpg --import my_private_key.asc<br />
+$ gpg --import my_public_key.asc
+</code></p>
<p>Ensure that the keyID printed is the correct one, and if so, then go ahead and add ultimate trust for it:</p>
$ gpg --edit-key [your@email]
</code></p>
-<p>Because this is your key, you should choose <code>ultimate</code>. You shouldn't trust anyone else's key ultimately.</p>
+<p>Because this is your key, you should choose <code>ultimate</code>. You shouldn't trust anyone else's key ultimately.</p>
<p class="notes"> Refer to <a href="#step-2b">Troubleshooting in Step 2.B</a> for more information on permissions. When transferring keys, your permissions may get mixed, and errors may be prompted. These are easily avoided when your folders and files have the right permissions</p>
</dd>