From 772f64267948a922484539c2b611ac62c8eda083 Mon Sep 17 00:00:00 2001 From: Malin Freeborn Date: Wed, 18 Oct 2023 23:25:54 +0200 Subject: [PATCH] add keyserver list --- data/gpg.md | 25 ++++++++++++++++++++++++- 1 file changed, 24 insertions(+), 1 deletion(-) diff --git a/data/gpg.md b/data/gpg.md index a0fe5dd..4402f79 100644 --- a/data/gpg.md +++ b/data/gpg.md @@ -91,18 +91,41 @@ Once you're in the interface, type `trust`. gpg --sign-key alice@posteo.net ``` -Then send those trusted keys up to a server, so people can see you have verified them: +# Swapping Keys + +This system relies on a ring of people swapping key information. + +## Sending + +Send those trusted keys up to a server, so people can see you have verified them: ```bash gpg --send-keys 024C6B1C84449BD1CB4DF7A152295D2377F4D70F ``` +## Upload Your Keys + +## Add More Key Servers + +Key servers often swap keys, but it's best to just send to multiple places immediately. +You can add key servers by adding this to `~/.gnupg/gpg.conf`. + +``` +keyserver hkps://keys.openpgp.org +keyserver hkps://mail-api.proton.me +keyserver hkps://keys.mailvelope.com +``` + # Refresh Keys +Refreshing keys will tell you if some key you have contains a signature from someone you already trust, or if someone has published a revocation certificate (meaning their key should not be trusted any more). + ```bash gpg --refresh-keys ``` +You can use the [crontab](../basics/cron.md) to refresh keys. + # Export Your public key: