gpg --full-generate-key
gpg --list-secret-keys --keyid-format LONG
gpg --edit-key 0261567733AE82EA
Split the private key in two parts, encrypt each part one by one using simple symmetric encryption with strong password. Dispatch both privatekeyN
parts in safe places (usb keys for example).
gpg --export-secret-keys --armor [email protected] > privatekey
split -n 2 privatekey --numeric-suffix privatekey
gpg --symmetric privatekey00
gpg --symmetric privatekey01
gpg --output ~/revocation.crt --gen-revoke
chmod 600 ~/revocation.crt
gpg --output ~/mypublic.key --armor --export [email protected]
gpg --send-keys --keyserver keys.openpgp.org AB173AEFA2C0E586357C82610261567733AE82EA
gpg --refresh-keys
gpg --refresh-keys --keyserver keys.openpgp.org
gpg --keyserver hkps.pool.sks-keyservers.net --search-keys [email protected]
gpg --fingerprint [email protected]
gpg --import someones.key
gpg --sign-key [email protected]
gpg --encrypt --sign --armor -r [email protected]
gpg --decrypt coded.asc > plain.txt
gpg --default-key E8C43461 --sign-key 6AA15948