yayi C++, python, image processing, hacking, etc

password tag

GPG subkeys manipulation: use case for the configuration of Thunderbird

GPG subkeys, trust contexts and privacy: the article deals with the concept of GPG subkeys and explains why it is a good practice, making the parallel with other password practices used today for websites. It details how to extract and manipulate subkeys for Thunderbird's GPG configuration.