Oh, and it gives you a use for GPG on your own, even if you don't have anyone with PGP to send email to, so that we might finally get the critical mass PGP needs! That combination will still be around for the next 20 years, at least, on most machines you can find. An encrypted Draft email is secure and readable on any machine that can access IMAP and decode PGP. Now you can store all your passwords in a completely secure way that is future compatible!Īll these various safe-keeping apps and programs for storing passwords are incompatible with each other. And best of all is encrypted Draft email: Using Drafts is almost the same, but with an added feature: The message stays editable, and automatically synchronizes between all your machines! So for note taking and other stuff that isn't really attention seeking, just notes for the future, Draft email is best. Many already use email to themselves as reminders.
Thunderbird Enigmail supports this, and it gives a very useful feature. This is a case of The internet never forgets.A feature I consider important: GPG-support for Draft email. Key servers will usually only add data to a key (if it is valid), never remove any, so once your key (with identities) is public, it will stay so. The identities and subkeys are each signed individually, so you can later add more identities or remove all but one using the command lines explained by Jens – I won't repeat this, as tool usage is off topic here. There also is a key identifier, which is some kind of hash of the main key. The private key corresponding to your main key and maybe private keys corresponding to the subkeys are the ones protected by your passphrase, but as long as these don't change, your passphrase still works. These express trust of these users that your key belongs to a specific identity. maybe digital signatures of any combination of main key and identity, signed by other keys/users.digital signatures of the identities (or combination of main key and identity) signed by the main key.
maybe digital signatures of the subkeys signed by the main key.maybe one or several sub keys (for the same or other public key encryption or signature schemes).A bunch of user identities (name, mail address, etc.) for this public key.modulus and public exponent) (or a public key for another signature scheme) – the main key. You can never remove a published key or parts of it from the keyservers.Ĭaveat: The sender now must select which key to encrypt to as his client cannot automatically assign a key to your email address any more (well, you deleted it).Ī public PGP key (or "certificate") as seen on the key servers or in your PGP application is a bundle of several pieces of data: As the key ID stays the same, an already published key can be looked up on the keyservers, they will not delete your UIDs but combine all they ever saw. If you did not publish your key yet, nobody will be able to find out who you are based on your OpenPGP key. You will be able to use it like before usually every OpenPGP encryption container contains your key ID which does not change, neither does your pass phrase. This removes all personal information from your key - including all signatures (each is bound to an UID), so your "stripped down" key will lose all trust. All selected UIDs will have a star in their record: (1)* Foo Bar Select all UIDs you want to remove (probably all but the newly created one): gpg> uid 1Īnd repeat as needed. Sub 2048R/DEADDA7A created: expires: never usage: E Pub 2048R/DEADBEEF created: expires: never usage: SC Now we're ready to delete all others, but need to know which to remove: gpg> list Start editing your key: $ gpg -edit-key 47AB515A
Gpg mail uninstall windows#
gnupg folder (for unix systems, for Windows wherever your key is stored)! You cannot remove all UIDs, but you can create one which does not link to your identity and remove all others.īackup your.