yayi C++, python, image processing, hacking, etc

sysadmin category

GPG configuration of Thunderbird with subkeys

General discussion about PGP/GPG subkeys, trust contexts and privacy in general. The article deals with the concept of GPG subkeys and explains why it is a good practice. We detail how to extract and manipulate subkeys and apply this to Thunderbird's configuration.

Managing several SSH identities explained

How do you manage several SSH identities when accesses are conflicting? I show various configurations along with their advantages/flaws, giving you precise control over how SSH uses your many identities.