-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
That was, I admit, an embarrassing mistake.
Split GPG encryption is now working! Thank you for helpin gme.
Please post a bitcoin address (signed and encrypted); would like to thank
you for your time.
My new, secure Split GPG public key fingerprin
On Sat, Jun 06, 2020 at 06:22:31PM -0700, Robert Spigler wrote:
>
>
> > >
> >
> > Read my last message - you dont actually type the angle brackets
> > This is simply a bash script, you can inspect for yourself: it's at
> > /usr/bin/qubes-gpg-client-wrapper
> >
> > I'm not sure I understand yo
> Once the simple variant works, try a more complicated one...
>
> Great idea. Just to see if I was being crazy, I created a new AppVM and
GPG key to test with. No 'qubes-gpg-client', '--trusted-key', etc.
Like @unman had been suggested, I continued to try:
gpg -r New_Key -e '/home/user/Test
> >
>
> Read my last message - you dont actually type the angle brackets
> This is simply a bash script, you can inspect for yourself: it's at
> /usr/bin/qubes-gpg-client-wrapper
>
> I'm not sure I understand your clarification - in any case, use the
> command line I cited without the angle
On 5/27/20 9:21 PM, Robert Spigler wrote:
qubes-gpg-client-wrapper -r robertspig...@protonmail.ch --trusted-key
-e
'/home/user/Documents/Test_Encryption.txt' -o /home/user/Documents/Final.gpg
Still results in:
bash: C2C60E279E86F10D5697782535CE0FE6C2141823: No such file or directory
I won
On Wed, May 27, 2020 at 12:21:00PM -0700, Robert Spigler wrote:
> qubes-gpg-client-wrapper -r robertspig...@protonmail.ch --trusted-key
> -e
> '/home/user/Documents/Test_Encryption.txt' -o /home/user/Documents/Final.gpg
>
> Still results in:
>
> bash: C2C60E279E86F10D5697782535CE0FE6C2141823:
qubes-gpg-client-wrapper -r robertspig...@protonmail.ch --trusted-key
-e
'/home/user/Documents/Test_Encryption.txt' -o /home/user/Documents/Final.gpg
Still results in:
bash: C2C60E279E86F10D5697782535CE0FE6C2141823: No such file or directory
What is the wrapper? This also does not open the qu
On Tue, May 26, 2020 at 01:46:36PM -0700, Robert Spigler wrote:
> I tried the command with '--output OutPutFilePath.asc':
>
> qubes-gpg-client --output /home/user/Documents/Final.asc --encrypt
> --recipient --trusted-key
> '/home/user/Documents/Test_Encryption.txt'
>
> Resulted in the error:
>
I tried the command with '--output OutPutFilePath.asc':
qubes-gpg-client --output /home/user/Documents/Final.asc --encrypt
--recipient --trusted-key
'/home/user/Documents/Test_Encryption.txt'
Resulted in the error:
bash: C2C60E279E86F10D5697782535CE0FE6C2141823: No such file or directory
Tri
On Mon, May 25, 2020 at 10:05:53PM -0700, Robert Spigler wrote:
> I apologize for the long absence. I appreciate your help.
>
> While this helped with the 'There is no assurance this key belongs to the
> named user' error, it still could not complete the encryption.
>
> qubes-gpg-client --output
I apologize for the long absence. I appreciate your help.
While this helped with the 'There is no assurance this key belongs to the
named user' error, it still could not complete the encryption.
qubes-gpg-client --output --OUTPUT_PATH.asc --encrypt --recipient
--trusted-key InFile
Continues t
On Sat, May 16, 2020 at 01:53:46PM -0700, Robert Spigler wrote:
> I'm considering posting in qubes-issues, but I want to make sure this isn't
> something I'm doing wrong myself/a stupid mistake before I do so. Looked
> around online, asked here and on twitter/reddit, and I'll continue to wait
>
I'm considering posting in qubes-issues, but I want to make sure this isn't
something I'm doing wrong myself/a stupid mistake before I do so. Looked
around online, asked here and on twitter/reddit, and I'll continue to wait
a few more days.
--
You received this message because you are subscrib
On 5/16/20 5:42 AM, Robert Spigler wrote:
I have a master private key (Certify Only) stored in Vault, separate
Encryption and Sign secrete_subkeys generated in Vault and stored in
networkless work-gpg. All public keys stored in a separate AppVM for
'qubes-gpg-client' command to access the work-
I have a master private key (Certify Only) stored in Vault, separate
Encryption and Sign secrete_subkeys generated in Vault and stored in
networkless work-gpg. All public keys stored in a separate AppVM for
'qubes-gpg-client' command to access the work-gpg VM via the Split GPG
protocol.
I h
15 matches
Mail list logo