Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
How do you share your GPG key securely on each system. Are you simply storing them on each machine, are you use cloud storage (seems like a horrible idea), SD cards?
Sharing across multiple systems like a laptop and a desktop. A work machine and home machine. I guess I could use a USB key, I would just hate to lose it somewhere one day...
The easy and customary way is to upload the public key to a well known key-server, such as pgp.mit.edu, then circulate its "key signature," which is an eight-digit hexadecimal number like 12AB-34CD. This is one way to allow the public key to be retrieved from the server.
On larger systems, there are other ways to do it. For instance, public keys can be stored in an LDAP ("OpenDirectory") server.
Since they, are ... well ... public, their contents do not have to be concealed. You just need a convenient way to manage them.
It's stored on each device you've imported it to. No need for it again, unless you want to import it to a new system. You can export it to a flash drive and then delete it after the import. You can keep a copy of it somewhere if you want, but it's risky. You can encrypt it somehow, via an encrypted drive or file like veracrypt/truecrypt, or encrypt it with gpg. It's safer left in your gpg app, though.
NOTE: I can never remember the proper sequence to make it write to a file instead of the terminal since I rarely need to do it. This is based on the man pages, and I *think* it's correct, but since I can't currently test it I can't say for sure that it will work as expected.
Then you will want to securely transfer the file to the other computer (preferably not over a network, use a USB key or something).
Then you need to import it
I can never remember gpg commands. Every desktop environment I know of has a GUI frontend for gpg, even Enigmail. It's far easier to do the import/export using them, at least for me. I don't do enough of that to maintain proficiency. Once Enigmail or whatever you're using is configured, there is no need to do much, or remember much, other than your passphrase. I don't carry my private key around, I only need it to import into a new program.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.