#Blocage des IP $url_site="desguin.net/spip"; # Entrez ici vos parametres de connexion mysql $host="ns1.gigaweb.be"; $user="admin_robot"; $mdp="9,cOZ0xN"; $database="ced_spip"; ?>
15 August 2015, by
See online : Howto: Install GPG on Jolla Sailfish OS
STEP 1 install pinentry
You have three options:
STEP 2 open the terminal and install the GnuPG software
[nemo@Jolla ~]$ pkcon install gnupg2
Currently this installs version 2.0.4 with a home of /.gnupg
Remember: the executable binary will be gpg2
(neither gnupg2, nor gpg).
Supported algorithms:
STEP 3 use the terminal to create a key
(or import your existing private key with gpg2 --import
)
[nemo@Jolla ~]$ gpg2 --gen-key
Please select what kind of key you want:
(1) DSA and Elgamal (default)
(2) DSA (sign only)
(5) RSA (sign only)
Your selection? [Enter]
DSA keypair will have 1024 bits.
ELG-E keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048) [Enter]
Requested keysize is 2048 bits
Please specify how long the key should be valid.
0 =
key does not expire<n> =
key expires in n days<n>w =
key expires in n weeks<n>m =
key expires in n months<n>y =
key expires in n yearsKey is valid for? (0) [Enter]
<code>Key does not expire at all
<code>Is this correct? (y/N) y
You need a user ID to identify your key; the software constructs the user ID from the Real Name, Comment and Email Address in this form:
"Heinrich Heine (Der Dichter)"
Real name: Davi Ottenheimer
Email address: davi@flyingpenguin.com
Comment:[Enter]
You selected this USER-ID:
"Davi Ottenheimer davi@flyingpenguin.com"
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O
Enter passphrase
Passphrase _*****************_______________
OK Cancel
THINK TWICE AND GATHER WISE ADVICE BEFORE PICKING YOUR PASS PHRASE See here (and never write it down anywhere: its only safe place is in your brain).
We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy.
gpg: key XXXXXXXX marked as ultimately trusted public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
pub 1024D/XXXXXXXX 2015-07-29
Key fingerprint = XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX
uid Davi Ottenheimer davi@flyingpenguin.com
sub 2048g/YYYYYYYY 2015-07-29
STEP 3.5 verify key
[nemo@Jolla ~]$ gpg2 -k
/home/nemo/.gnupg/pubring.gpg
-----------------------------
pub 1024D/XXXXXXXX 2015-07-29
uid Davi Ottenheimer davi@flyingpenguin.com
sub 2048g/YYYYYYYY 2015-07-29
NOTE: you may want to move and keep your secret keys (secring.gpg
) and their back-ups in an encrypted and/or hidden and/or obfuscated form. Please manage file properties (owner, permissions) very carefully: keep in mind that your smartphone is an always connected thing, most of the time unattended, through a wide variety of wireless equipment you know nothing about.
By Davi Ottenheimer – July 29, 2015
See also here
[1] And please pick a strong password for Developer mode, not ’dev’ or ’qwerty’.