Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GnuPG guide] do not store secret keys in disk #539

Open
heitorPB opened this issue Aug 29, 2018 · 2 comments
Open

[GnuPG guide] do not store secret keys in disk #539

heitorPB opened this issue Aug 29, 2018 · 2 comments

Comments

@heitorPB
Copy link

In the section Keep your primary key entirely offline, the guide writes to disk the secret keys. This is not so good, as it can be retrieved. In this guide, the author creates a temporary directory in ram just for this step. It is a good idea to add this to the guide.

@ckotte
Copy link

ckotte commented Sep 30, 2018

You should boot into Tails and create the keys there and store it in a VeraCrypt volume

@wh1t3fang
Copy link

I think Nitrokeys are a good solution to this problem as well. https://www.nitrokey.com/ This would allow users to take their keys with them when they leave their primary computer. Instead of sitting around in a default GPG directory on the computer, the users private keys would be stored on the Nitrokey for use by GPG.
These devices can also be used as hardware 2 factor authentication tokens which are more secure than commonly used SMS based 2nd factors.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants