From b3e65ce49eb67cd2573b5552faa5afb3d03de24a Mon Sep 17 00:00:00 2001 From: Adam Leibson Date: Thu, 13 Aug 2015 11:09:56 -0400 Subject: [PATCH] commit --- en/index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/en/index.html b/en/index.html index d20ae5d2..ed8d1e3f 100644 --- a/en/index.html +++ b/en/index.html @@ -229,7 +229,7 @@
To use the diceware method, you will need dice (preferably 5, but 1 will do) and this list of words. Do not substitute computer dice for physical dice. Notice that each word on the word list corresponds to a unique five-digit number. Role one dice five times, or five dice once to select the first word. Don't rearrange or discard words, because doing so makes the process much less secure. Repeat this process until you have at least six words, and there's your password.
Command line key generation
-
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than algorithms recommended in the old previously mentioned documentation.
+
If you prefer using the command line for a higher degree of control, you can follow the documentation from the GnuPG Mini Howto or The GNU Privacy Handbook. Make sure you stick with "RSA and RSA" (the default), because it's newer and more secure than the algorithms recommended in the old previously mentioned documentation.
Advanced key pairs
When GnuPG creates a new keypair, it compartmentalizes the encryption function from the signing function through subkeys. If you use subkeys carefully, you can keep your GnuPG identity much more secure and recover from a compromised key much more quickly. Alex Cabal and the Debian wiki provide good guides for setting up a secure subkey configuration.
-- 2.25.1