From 29db7a834661dc006a5cfe56dd72b9c42f55387f Mon Sep 17 00:00:00 2001 From: Adam Leibson Date: Tue, 11 Aug 2015 15:11:58 -0400 Subject: [PATCH] commit --- en/index.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/en/index.html b/en/index.html index 2d6d857a..8efc4e6b 100644 --- a/en/index.html +++ b/en/index.html @@ -235,11 +235,11 @@
To use the diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
Command-line key generation
-
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than algorithms recommended in the old previously mentioned documentation.
- +
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than algorithms recommended in the old previously mentioned documentation.
Advanced key pairs
When GnuPG creates a new keypair, it compartmentalizes the encryption function from the signing function through subkeys. If you use subkeys carefully, you can keep your GnuPG identity much more secure and recover from a compromised key much more quickly. Alex Cabal and the Debian wiki provide good guides for setting up a secure subkey configuration.
+ -- 2.25.1