[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] GnuPG and Tor



It sounds like you'd be interested in Parcimonie:

https://github.com/EtiennePerot/parcimonie.sh
https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/

It is a script to refresh your keyring over Tor without disclosing your
entire keyring to the keyserver or others.

Michael

grarpamp:
> On Tue, Jul 15, 2014 at 8:48 AM, Red Sonja
> <BM-2cTpEdTADjx2bQf6WuuX1CPER78Sq3xL76@xxxxxxxxxxxxx> wrote:
>> secured server. Or anybody can see your whole addressbook. So it is a
>> secured server. But still, it is quite obvious who am I just by looking
>> at that list. So I figured out, maybe if I push the refresh through Tor,
>> talking with a secured server that would make things more private. I
> 
> And unless one by one with --recv-keys, keyserver sees your
> entire list at once.
> 
>> keyserver-options http-proxy=socks5://127.0.0.1:9150
> 
> A socks5 service is not an http proxy service, privoxy is.
> 

-- 
Michael Carbone
Tech & Policy Manager
Access | https://www.accessnow.org

GPG: 0x81B7A13E
Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E


Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk