[tor-talk] GnuPG and Tor
Michael Carbone
michael at accessnow.org
Tue Jul 15 19:11:15 UTC 2014
It sounds like you'd be interested in Parcimonie:
https://github.com/EtiennePerot/parcimonie.sh
https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/
It is a script to refresh your keyring over Tor without disclosing your
entire keyring to the keyserver or others.
Michael
grarpamp:
> On Tue, Jul 15, 2014 at 8:48 AM, Red Sonja
> <BM-2cTpEdTADjx2bQf6WuuX1CPER78Sq3xL76 at bitmessage.ch> wrote:
>> secured server. Or anybody can see your whole addressbook. So it is a
>> secured server. But still, it is quite obvious who am I just by looking
>> at that list. So I figured out, maybe if I push the refresh through Tor,
>> talking with a secured server that would make things more private. I
>
> And unless one by one with --recv-keys, keyserver sees your
> entire list at once.
>
>> keyserver-options http-proxy=socks5://127.0.0.1:9150
>
> A socks5 service is not an http proxy service, privoxy is.
>
--
Michael Carbone
Tech & Policy Manager
Access | https://www.accessnow.org
GPG: 0x81B7A13E
Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140715/99c6c1fb/attachment-0001.sig>
More information about the tor-talk
mailing list