yayi C++, python, image processing, hacking, etc

sysadmin category

GPG subkeys manipulation: use case for the configuration of Thunderbird

GPG subkeys, trust contexts and privacy: the article deals with the concept of GPG subkeys and explains why it is a good practice, making the parallel with other password practices used today for websites. It details how to extract and manipulate subkeys for Thunderbird's GPG configuration.

Managing several SSH identities explained

How do you manage several SSH identities when accesses are conflicting? I show various configurations along with their advantages/flaws, giving you precise control over how SSH uses your many identities.