

Send confidential emails safely once and for all:.gpg4o® by Giegerich & Partner guarantees the privacy of your electronic correspondence by mail encryption.gpg4o® is suitable both for private and enterprise use. Send confidential email in Microsoft® Outlook® 2010/2013/2016 safely once and for all with gpg4o®, developed by Giegerich & Partner, based on OpenPGP, one of the most widely used and safest cryptographic techniques worldwide. Preserve the privacy of your electronic correspondence. We use the same ID as in the above example.Protect your sensitive mail content – with IT-Security made in Germany We export the key the same way as we did when adding it to GitHub but we also add a flag for saving it to a file. One for each GitHub account and one for each email address. So I organize my gpg keys by what they are used for instead. If I do this locally I need the same private key connected to the public key, different keys won't work. If I receive an email that has been encrypted with my public key I need the private key to be able to decrypt and read the email. The reason is with an example for encrypting/decprypting email. When it comes to ssh keys I always generate one for each device but I don't do it for my GPG keys, even though it is a bit more secure. The latter is easier but if one device is compromised so are all of the other private keys you use, because they are the same. So it's safer but also adds a bit more work and currently GitHub doesn't distinguish keys in a good way in my opinion. If you generate new ones you also need to add them to GitHub but if you lose one device it's easy to just remove the public one on GitHub. In short you have two choices here, either you generate a new key on each of your devices or you use the same key across all of them. Gpgconf -kill gpg-agent Use signing with keys on multiple devices
