In Linux kernel maintainer PGP guide I don’t understand the section “Back up your whole GnuPG directory”, and it is also asymmetric with the section discussing paperkey.
AFAIK, this should be sufficient:
gpg --output "priv_0.pgp" --armor --export-secret-key
I do 16 of these and then copy those to an USB stick (i.e. one for each hex digit).
Hmm.. With DIP switches set to “SDIO” mode, VisionFive2 SBC gives the most informative error message ever:
BOOT fail,Error is 0xffffffff
I’d guess the last value is -1
in 1’s complement format but other than that 🤷
I used #BuildRoot and visionfive2_defconfig
. Not sure how feature complete so maybe I will try the official SDK for comparison.
#Rust installation instructions go like:
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
But what you actually want to do most of the time, is probably:
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | bash -s -- --no-modify-path
Learned a bit o #python #gnupg bindings to automate tasks, as gpg command line can be sometimes a bit confusing and ambiguous.
E.g. this is how to purge revoked keys after gpg --refresh-keys
:
#!/usr/bin/env python3
import gnupg
if __name__ == "__main__":
gpg = gnupg.GPG()
keys = gpg.list_keys(True)
for k in keys:
info_db = k['subkey_info']
for subk in k['subkeys']:
info = info_db[subk[0]]
if info['trust'] == 'r':
fp = subk[2]
print(f"{fp} {gpg.delete_keys(fp, expect_passphrase=False, exclamation_mode=True)}")
Definitely worth of trouble because I’m super-talented on making destructive mistakes with command-line arguments :-)