mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-26 07:49:34 -05:00
UserDoc/SplitGpg changed
Show no keys are stored in the local AppVM
This commit is contained in:
parent
a9833eb5f7
commit
d8526772f5
@ -61,6 +61,7 @@ Normally it should be enough to set the `QUBES_GPG_DOMAIN` to the GPG backend do
|
||||
|
||||
``` {.wiki}
|
||||
[user@work ~]$ export QUBES_GPG_DOMAIN=work-gpg
|
||||
[user@work ~]$ gpg -K
|
||||
[user@work ~]$ qubes-gpg-client -K
|
||||
/home/user/.gnupg/secring.gpg
|
||||
-----------------------------
|
||||
@ -73,6 +74,8 @@ ssb 4096R/30498E2A 2012-11-15
|
||||
(...)
|
||||
```
|
||||
|
||||
Note that running normal `gpg -K` in the demo above shows no private keys stored in this AppVM.
|
||||
|
||||
However, when using Thunderbird with Enigmail extension it is not enough, because Thunderbird doesn't preserve the environment variables. Instead it is recommended to create a short script e.g. in the user home directory (name it e.g. `.qubes_gpg.sh` and make it executable):
|
||||
|
||||
``` {.wiki}
|
||||
|
Loading…
Reference in New Issue
Block a user