f49e562c6c7f53f370e24690b0841b3c7f8bf515
Tech/GnuPGKeyManagement.md
... | ... | @@ -534,6 +534,7 @@ Example: Agent A leaves role R, Agent B takes over role R |
534 | 534 | |
535 | 535 | # Subkeys for Untrusted Devices |
536 | 536 | |
537 | +* [Debian Subkey article](https://wiki.debian.org/Subkeys) |
|
537 | 538 | * See [GnuPG Cross Certification][34] |
538 | 539 | * Secondary signing key only for day-to-day use or on vulnerable systems. (e.g. mobile phones) |
539 | 540 | * Secret subkey import not supported by BouncyCastle |
... | ... | @@ -638,4 +639,4 @@ Example: Agent A leaves role R, Agent B takes over role R |
638 | 639 | [33]: http://markferry.net/dl/Tech_White_Paper_2002_-_Using_OpenPGP_in_Corporations.pdf |
639 | 640 | [34]: http://www.gnupg.org/faq/subkey-cross-certify.en.html |
640 | 641 | [36]: http://lists.gnupg.org/pipermail/gnupg-users/2005-May/025612.html |
641 | - [37]: http://projects.gnome.org/seahorse/ |
|
... | ... | \ No newline at end of file |
0 | + [37]: http://projects.gnome.org/seahorse/ |