This commit is contained in:
vrushti-mody 2020-06-05 16:15:32 +05:30
parent 62380052ee
commit d9c3321e55

View File

@ -57,7 +57,8 @@ This way it would be easy to spot unexpected requests to decrypt documents.
Doing so won't provide any extra security anyway, as explained [above][intro] and [below][using Split GPG with subkeys]. Doing so won't provide any extra security anyway, as explained [above][intro] and [below][using Split GPG with subkeys].
If you are generating a new key pair, or if you have a private key that already has a passphrase, you can use `gpg2 --edit-key <key_id>` then `passwd` to set an empty passphrase. If you are generating a new key pair, or if you have a private key that already has a passphrase, you can use `gpg2 --edit-key <key_id>` then `passwd` to set an empty passphrase.
Note that `pinentry` might show an error when you try to set an empty passphrase, but it will still make the change. Note that `pinentry` might show an error when you try to set an empty passphrase, but it will still make the change.
(See [this StackExchange answer][se-pinentry] for more information.) Note: The error shows only if you **do not** have graphical pinentry installed. The Split GPG client lets you use password-protected keys, the vault qube will show a passphrase if you are using R4. (See [this StackExchange answer][se-pinentry] for more information.)
Note: The error shows only if you **do not** have graphical pinentry installed. The Split GPG client lets you use password-protected keys, the vault qube will show a passphrase if you are using R4.
## Configuring Split GPG ## ## Configuring Split GPG ##