Yubikey 1 - Securely Generating PGP Keys

Yubikey 1 - Securely Generating PGP Keys

402 Payment Required

2 года назад

16,565 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@kinkycontango
@kinkycontango - 23.06.2024 04:09

Oh my gosh, this is fantastic.

Ответить
@sectorx20
@sectorx20 - 13.06.2024 04:55

Would you care leaving an .img from this microSD online somewhere? It's like nothing can really break it right?

Ответить
@tPL2g34
@tPL2g34 - 31.05.2024 21:29

Why would I want to enter my name and email when generating my master key?
Why would I not want to do it?

Could you please elaborate on that?

Ответить
@mtscott44
@mtscott44 - 23.05.2024 14:01

Very sexy indeed. Thanks again for everything, learning so much.

Ответить
@user-rl6wo7mo3g
@user-rl6wo7mo3g - 17.05.2024 17:04

Thank you very much for creating such lovely series. Its quite insightful and easy to follow. Can you also explain how to use the same pair of Private and Public keys (signing key) and generate a certificate which we can load back onto Yubikey and use it to sign PDF files. (How to generate the certificate and what to send to a Certifying Authority for them to add to their database / directory, so if anyone signs the PDF the same can be validated. That would be really very helpful.

Ответить
@spiraldynamics6008
@spiraldynamics6008 - 03.03.2024 00:01

So sexy ❤

Ответить
@mikerollin4073
@mikerollin4073 - 16.10.2023 21:35

This work can all be done using the basic "Yubikey Security Keys", as oppose to the " Yubikey 5 Series" etc,.?

Also, do 2 keys suffice?

I watch a ton of tech tuts and this has got to be one of the best, despite the monotonous robot voice, I've ever seen. Thanks!

Ответить
@timherty5238
@timherty5238 - 15.10.2023 13:40

Can anybody explain, why Ithe extra step of exporting the keys, when in the end the entire gnupg girectory get saved anyways?

Ответить
@kalkulusrampage
@kalkulusrampage - 10.09.2023 16:30

why don't use dd instead of all the balena nonsense

Ответить
@eatshrots
@eatshrots - 31.08.2023 18:32

how would I use this private key with Mailvelope? for me to be able to sign documents, I would have to upload my private key to it, right?

Ответить
@sectorx20
@sectorx20 - 28.08.2023 05:34

I had to come back here to ask: I'm doing this myself and it seems more reliable than industrial microSDs. Have you considered burning data onto a long-term Blu-ray or DVD instead? The ones that last for hundreds of years are virtually unbreakable, even against solar cosmic rays.

Ответить
@SimiForKing
@SimiForKing - 18.07.2023 15:33

The current version of GnuPG is 2.4.3 and GnuPG on Tails is 2.2.27 is there any problems with it? Do you know how to check if gpg is safe?

I tried to convince someone to Tails, but he’s a little wary about it, asked me the question is whether the version in this system has not been modified by someone to generate keys with specific properties? How can be sure with it? Is there a way to check this? E.g. by fingerprints of executable files as a security mechanism?

Ответить
@SimiForKing
@SimiForKing - 16.07.2023 13:28

What’s the point of making subkeys? You use here option 8, which is RSA (set your own capabilities) and at first generate a master key which is used to certification and then generate subkeys for signing, encrypting and authenticating, but the default option is SCA. Can’t we just generate the master key with all options SCEA or SCA?

When I see someone’s key, it often shows that the master key is used for certification and signing (SC), does it matter what the distribution of these keys is? Are there any option that are better/worse?
Why in this case, we used only the master key for certification and generated subkeys for all operations separately?

Ответить
@mikerollin4073
@mikerollin4073 - 10.07.2023 23:19

Would you consider a singleboard computer like a raspberry pi with an IR receiver to be not sufficiently airgapped?

Theyre pretty low bandwidth but...

Ответить
@raphamejias
@raphamejias - 03.07.2023 17:00

Hi, I’ve watched this, congrats for your work. But I’ve one doubt, why you create a master key as C and not as a SC? Thanks

Ответить
@sectorx20
@sectorx20 - 26.03.2023 09:20

Sorry my ignorance, but what's the difference between having a luks encryption or a strong passphrase on a PGP key ? Why is not dangerous having my luks encryption in others people hands but it's dangerous having my PGP key lost even it having he same strong passphrase?

Ответить
@iamj2
@iamj2 - 21.03.2023 00:56

How do you renew the sub keys when they expire? And will you still be able to decrypt any files you’ve encrypted with the expired sub key after renewing it?

Ответить
@sectorx20
@sectorx20 - 14.03.2023 14:55

When you say a good USB drive, do you have advice about what brand and model?

Ответить
@WillHampson
@WillHampson - 08.03.2023 18:53

Curious why you're chosing RSA vs ECC for this ? Just familiarity and understandability of RSA?

Ответить
@SimiForKing
@SimiForKing - 07.02.2023 12:35

Do I need to have Linux as operating system to do this, or can I just use virtual machine with Linux?

Ответить
@PietroBroccolo
@PietroBroccolo - 26.12.2022 14:58

you made an awsome series! can you pls make a video update to this in order to use Nitrokey instead Yubikey?

Ответить
@alaamansour2707
@alaamansour2707 - 02.12.2022 13:20

hello, what if i have already a PGP keys generated for my self-hosted email address? can i regenerate them and continue air-gapped? what is the difference in steps?

Ответить
@caldayham
@caldayham - 04.11.2022 07:07

dude, thank you

Ответить
@vitorsilva-or1dj
@vitorsilva-or1dj - 11.09.2022 19:09

thanks, very useful

Ответить
@klorianl9854
@klorianl9854 - 24.08.2022 18:22

great series! completed all ;) I can't thank you enough for providing such useful tutorials.

Ответить
@arkad7633
@arkad7633 - 11.08.2022 14:35

How Can I change the email of my pubkey?

Ответить
@somekindofbox264
@somekindofbox264 - 10.05.2022 18:44

What's the reason behind restricting your master key to certify?

Ответить
@OPIXdotWORLD
@OPIXdotWORLD - 28.03.2022 16:31

AWESOME SERIES /... thanx very much...

Ответить
@Ziggurat1
@Ziggurat1 - 17.03.2022 11:07

Why use BelenaEtcher? Don't you have to trust an app that can be compromised then? the cp command in linux can litteraly write the image to the usb drive as well ( yes so it is bootable)

Ответить
@liberty-vf4bi
@liberty-vf4bi - 13.03.2022 12:26

I do not get the “airgapped” part. Any old laptop would be already be “compromised” for having been on the internet. So removing hdd and network makes no sense. Second. Tails is already booting without “network”, booting in memory and therefor sufficient for all steps mentioned. Or am i missing something?

Ответить
@louisdauvergne1727
@louisdauvergne1727 - 26.02.2022 17:01

you back <3

Ответить