+Use the following commands to transfer your keys. To avoid getting your key compromised, store it in a safe place, and make sure that if it is transferred, it is done so in a trusted way. Importing and exporting a key can be done with the following commands:
-
+
$ gpg --export-secret-keys -a keyid > my_private_key.asc
$ gpg --export -a keyid > my_public_key.asc
$ gpg --import my_private_key.asc
-$ gpg --import my_public_key.asc
-
+$ gpg --import my_public_key.asc
+
Ensure that the keyID printed is the correct one, and if so, then go ahead and add ultimate trust for it:
-
+
+
$ gpg --edit-key [your@email]
-
+
-Because this is your key, you should choose ultimate. You shouldn't trust anyone else's key ultimately.
+Because this is your key, you should choose ultimate. You shouldn't trust anyone else's key ultimately.
Refer to troubleshoot in step 2.B for more information on permissions. When transferring keys, your permissions may get mixed, and errors may be prompted. These are easily avoided when your folders and files have the right permissions
@@ -524,7 +525,8 @@ alt="Step 3.A: Troubleshoot" />
Step 3.a Set up your email with encryption
-Once you have set up your email with encryption, you can start contributing to encrypted traffic on the Internet. First we'll get your email client to import your secret key, and we will also learn how to get other people's public keys from servers so you can send and receive encrypted email.
+
+
Once you have set up your email with encryption, you can start contributing to encrypted traffic on the Internet. First we'll get your email client to import your secret key, and we will also learn how to get other people's public keys from servers so you can send and receive encrypted email.
# Open your email client and use "Tools" → OpenPGP Manager
# Under "File" → Import Secret Key(s) From File
--
2.25.1