It sounds like you'd be interested in Parcimonie: https://github.com/EtiennePerot/parcimonie.sh https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/ It is a script to refresh your keyring over Tor without disclosing your entire keyring to the keyserver or others. Michael grarpamp: > On Tue, Jul 15, 2014 at 8:48 AM, Red Sonja > <BM-2cTpEdTADjx2bQf6WuuX1CPER78Sq3xL76@xxxxxxxxxxxxx> wrote: >> secured server. Or anybody can see your whole addressbook. So it is a >> secured server. But still, it is quite obvious who am I just by looking >> at that list. So I figured out, maybe if I push the refresh through Tor, >> talking with a secured server that would make things more private. I > > And unless one by one with --recv-keys, keyserver sees your > entire list at once. > >> keyserver-options http-proxy=socks5://127.0.0.1:9150 > > A socks5 service is not an http proxy service, privoxy is. > -- Michael Carbone Tech & Policy Manager Access | https://www.accessnow.org GPG: 0x81B7A13E Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk