-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
improve GnuPG configuration file /etc/skel/.gnupg/gpg.conf
#223
Comments
This should not be too hard. Just choose the one that keeps winning the cipher competitions. Also, we should make post quantum options the default as soon as possible, for the asymmetric stuff I mean. Reasonable path for the future is follow this draft really closely. There are individual post-quantom implementations, but these are not standardized. We should just follow closely the developments in standardization of this. Many big boy projects are already sponsoring the development of such standards. These will be available in the wild. We just want to be ahead of the curve to adapt. Not to mention, the other side should also support these technologies for them to work as intended. |
Unless using live mode, writing to RAM is too difficult for users. /tmp isn't guaranteeing that nothing is written to the disk. (Swap, crash dumps. This goes into the topic of anti-forensics. In short: forget about it and use live mode.) But what is the point of writing to RAM anyhow in this context? The private key needs to be stored persistently somewhere anyhow. |
Another hardend GnuPG configuration: |
|
Stronger ciphers?
Any other hardening suggestions?
https://github.com/Kicksecure/security-misc/blob/master/etc/skel/.gnupg/gpg.conf
https://forums.whonix.org/t/anon-gpg-tweaks-gpg-conf-enhancements-duraconf-a-collection-of-hardened-configuration-files/5378
https://www.kicksecure.com/wiki/Air_Gapped_OpenPGP_Key
https://www.kicksecure.com/wiki/OpenPGP
The text was updated successfully, but these errors were encountered: