![]() Enter the following command to start generating your key: The next step is to add a subkey that will be used for encryption. At this point, you have generated a private/public key pair with a public key that can be used for signing purposes. You may want to use the command “ –edit-key” to generate a subkey for this purpose. Uid (comment) that this key cannot be used for encryption. Gpg: key F709C771 marked as ultimately trusted Please do some other work to give the OS a chance to collect more entropy! (Need 284 more bytes) If you do, follow the instructions and the key generation process will start automatically. ![]() It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation this gives the random number generator a better chance to gain enough entropy. We need to generate a lot of random bytes. You need a Passphrase to protect your secret key. ![]() " (comment) (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O You need a user ID to identify your key the software constructs the user ID from the Real Name, Comment and Email Address in this form: Please specify how long the key should be valid.Ġ = key does not expire # SELECT THIS OPTION = key expires in n days
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |