From e0ffca1c56de4c43baad31375cc6d3b7a412542b Mon Sep 17 00:00:00 2001 From: Axon Date: Fri, 4 Oct 2013 00:25:44 +0000 Subject: [PATCH] UserDoc/OpenPGP changed --- UserDoc/OpenPGP.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/UserDoc/OpenPGP.md b/UserDoc/OpenPGP.md index 3c764f49..ae48bee0 100644 --- a/UserDoc/OpenPGP.md +++ b/UserDoc/OpenPGP.md @@ -12,7 +12,7 @@ One of the main advantages of Qubes is that it allows the user to isolate sensit Basic Instructions ------------------ -The basic procedure is to create a master keypair and any number of signing/encryption subkeys in your ultimately trusted "vault" domain. The secret portion of the master keypair should never leave your vault. The public portion of the master key, along with the subkeys, can then be [copied](/wiki/VmTools/QvmCopyToVm) to any number of less trusted domains, e.g. "work," where they will be used normally. If your work domain is ever compromised (and your subkeys along with it), your master key will still be safe, and you can issue new subkeys. For detailed instructions, see the tutorials and discussions below. +The basic procedure is to create a master keypair and any number of signing/encryption subkeys in your ultimately trusted "vault" domain. The secret portion of the master keypair should never leave your vault. The public portion of the master key, along with the subkeys, can then be [copied](/wiki/VmTools/QvmCopyToVm) to any number of less trusted domains, e.g. "work," where they will be used normally. If your work domain is ever compromised (and your subkeys along with it), your master key will still be safe, and you can issue new subkeys. For detailed instructions, see the [tutorials and discussions](/wiki/UserDoc/OpenPGP#TutorialsandDiscussions) below. Security Recommendations ------------------------