[tor-talk] GnuPG and Tor

Michael Carbone michael at accessnow.org
Tue Jul 15 19:11:15 UTC 2014

It sounds like you'd be interested in Parcimonie:


It is a script to refresh your keyring over Tor without disclosing your
entire keyring to the keyserver or others.


> On Tue, Jul 15, 2014 at 8:48 AM, Red Sonja
> <BM-2cTpEdTADjx2bQf6WuuX1CPER78Sq3xL76 at bitmessage.ch> wrote:
>> secured server. Or anybody can see your whole addressbook. So it is a
>> secured server. But still, it is quite obvious who am I just by looking
>> at that list. So I figured out, maybe if I push the refresh through Tor,
>> talking with a secured server that would make things more private. I
> And unless one by one with --recv-keys, keyserver sees your
> entire list at once.
>> keyserver-options http-proxy=socks5://
> A socks5 service is not an http proxy service, privoxy is.

Michael Carbone
Tech & Policy Manager
Access | https://www.accessnow.org

GPG: 0x81B7A13E
Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140715/99c6c1fb/attachment-0001.sig>

More information about the tor-talk mailing list