commit
authorAdam Leibson <adaml@fsf.org>
Tue, 11 Aug 2015 19:10:20 +0000 (15:10 -0400)
committerAdam Leibson <adaml@fsf.org>
Tue, 11 Aug 2015 19:10:20 +0000 (15:10 -0400)
en/index.html

index e73fa585920cb64b3bb9631a90b0b5911cacf0ba..2d6d857ab5e7e230a4ffc89501797704e5be1adc 100644 (file)
                                                                        <dd>If you prefer using the command line for a higher degree of control, you can follow the documentation from the <a href="http://www.dewinter.com/gnupg_howto/english/GPGMiniHowto-3.html#ss3.1">GnuPG Mini Howto</a> or <a href="https://www.gnupg.org/gph/en/manual/c14.html#AEN25">The GNU Privacy Handbook</a>. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than algorithms recommended in the old previously mentioned documentation.</dd>
                                                         </dl>
 
+                                                               <dt>Advanced key pairs</dt>
+                                                                       <dd>When GnuPG creates a new keypair, it compartmentalizes the encryption function from the signing function through <a href="https://wiki.debian.org/Subkeys">subkeys</a>. If you use subkeys carefully, you can keep your GnuPG identity much more secure and recover from a compromised key much more quickly. Alex Cabal and the Debian wiki provide good guides for setting up a secure subkey configuration.</dd>
                                                 </div><!-- /.troubleshooting -->
                                        </div><!-- End .main -->
                                </div><!-- End #step-2a .step  -->