f49e562c6c7f53f370e24690b0841b3c7f8bf515
Tech/GnuPGKeyManagement.md
| ... | ... | @@ -534,6 +534,7 @@ Example: Agent A leaves role R, Agent B takes over role R |
| 534 | 534 | |
| 535 | 535 | # Subkeys for Untrusted Devices |
| 536 | 536 | |
| 537 | +* [Debian Subkey article](https://wiki.debian.org/Subkeys) |
|
| 537 | 538 | * See [GnuPG Cross Certification][34] |
| 538 | 539 | * Secondary signing key only for day-to-day use or on vulnerable systems. (e.g. mobile phones) |
| 539 | 540 | * Secret subkey import not supported by BouncyCastle |
| ... | ... | @@ -638,4 +639,4 @@ Example: Agent A leaves role R, Agent B takes over role R |
| 638 | 639 | [33]: http://markferry.net/dl/Tech_White_Paper_2002_-_Using_OpenPGP_in_Corporations.pdf |
| 639 | 640 | [34]: http://www.gnupg.org/faq/subkey-cross-certify.en.html |
| 640 | 641 | [36]: http://lists.gnupg.org/pipermail/gnupg-users/2005-May/025612.html |
| 641 | - [37]: http://projects.gnome.org/seahorse/ |
|
| ... | ... | \ No newline at end of file |
| 0 | + [37]: http://projects.gnome.org/seahorse/ |