I saw people starting to use `age` as a replacement to gpg. Can ...
I saw people starting to use `age` as a replacement to gpg. Can ...
Age has authenticated encryption so it is slightly more convenient for stuff like encrypting backups that you think might undergo some sort of known plain text ...
State of Age (GPG file encryption alternative) : r/crypto - Reddit
24 votes, 60 comments. I am wondering what the people here think the state of Age ? Is it ready for real world use?
age and Authenticated Encryption - Filippo Valsorda
age is a file encryption format, tool, and library. It was made to replace one of the last remaining GnuPG use cases, but it was not made to replace GnuPG.
Could Age Replace OpenPGP? - The Call of the Open Sidewalk
To be clear, “recovery” here is the sifting of good data from bad. Neither age or GnuPG can regenerate good data from redundant bad data. ... Age has returned a ...
Age vs GPG · FiloSottile age · Discussion #432 - GitHub
I have a simple encryption workflow that I use on an almost daily basis, for which I've been using GnuPG with symmetric crypto ( gpg -c ) for many years. Can ...
Thoughts on PGP vs signify and age? - Google Groups
But how does this help? I find myself often using GPG the same way you describe signify. The WOT stuff is optional and can be used on a case-by ...
A few comments on 'age' - Neil Madden
Update: I've updated the section on Cryptographic Doom at the end of the article after clarifications from the age author.
Command Line – Modern File Encryption - » Linux Magazine
Age is designed as a partial replacement for PGP and GPG. It is not a complete replacement, because it lacks a wizard and does not manage keyrings or many other ...
Approval of GPG key strategy - Information Security Stack Exchange
Only one encryption key because otherwise it's not clear which public encryption key other people should use. ... I will use it to: sign ...
FiloSottile/age: A simple, modern and secure encryption ... - GitHub
If the argument to -R (or -i ) is - , the file is read from standard input. Passphrases. Files can be encrypted with a passphrase by using -p/--passphrase . By ...
GPG And Me - Moxie Marlinspike
... someone who would voluntarily use GPG. I don't mean someone who ... can start fresh with a different design philosophy. When we do ...
Can I change expiration date of a gpg key I've already sent to a key ...
You can change the expiration date locally: gpg --edit-key
"Please select what kind of key you want" ~~ suggestion to developers
The easier it is for beginners to understand PGP/GPG technology, the faster its adoption into general use by the public will occur.
gpg decryption fails with no secret key error - Stack Overflow
The new keyring is written to STDOUT or to the file given with option --output . Use together with --armor to mail those keys. --export-secret- ...
How Do I Use GPG for Encryption? - Liquid Web
How do I Find Other Users' Public Keys? How do I Make My Public Key Available To Others? How do I Encrypt and Decrypt Messages with GPG?
Why do people keep telling me to use PGP? The answer is that they ... Filippo Valsorda is working on “age” for these use cases, and I'm ...
Now I Understand why Almost No One uses Encrypted Email
... can be generated if two people are using different versions of GnuPG. I mentioned this to her when I emailed the new key. A few weeks later ...
20220102-a-new-future-for-gnupg
A minor drawback is that for a quick start and easy migration from Chiasmus, many sites will use symmetric-only encryption (i.e. based on "gpg - ...
Warning: apt-key is deprecated. Manage keyring files in trusted.gpg ...
If you have a custom umask_override set for sudo , or if you use ACLs, files will be created with different permissions than usual. In those ...
Creating the perfect GPG keypair - Alex Cabal
I'm going to lead you through the steps to create a new keypair using this subkey method. To do this we'll be using GPG 1.4.11, which is the ...