diff --git a/pass/en.lproj/Localizable.strings b/pass/en.lproj/Localizable.strings index fbf87ff..3f03a0f 100644 --- a/pass/en.lproj/Localizable.strings +++ b/pass/en.lproj/Localizable.strings @@ -299,21 +299,45 @@ to get the key in this specific format. Subsequently, copy it to a location acce "GpgAsciiArmorCopyExplanation." = "GnuPG supports the command-line option \"-a\" that causes output to be generated in an ASCII-armored format similar to unencoded documents rather than the binary format. Use - $ gpg --export -a KEY_ID - $ gpg --export-secret-keys -a KEY_ID + $ gpg --list-keys -to get the public and the private key in this specific format. The clipboard will be cleared 45s after pasting."; +to identify your encryption (E) subkey, then use: + + $ gpg --export -a KEY_ID! > subkey.pub + $ gpg --export-secret-subkeys -a KEY_ID! > subkey + +to get the public and the encryption private subkeys in this specific format. Check that no Authentication subkey is accidentally exported, using: + + $ gpg --show-key subkey + +The clipboard will be cleared 45s after pasting."; "GpgAsciiArmorServerExplanation." = "GnuPG supports the command-line option \"-a\" that causes output to be generated in an ASCII-armored format similar to unencoded documents rather than the binary format. Use - $ gpg --export -a KEY_ID - $ gpg --export-secret-keys -a KEY_ID + $ gpg --list-keys -to get the public and the private key in this specific format. Subsequently, copy them to your secured key server."; +to identify your encryption (E) subkey, then use: + + $ gpg --export -a KEY_ID! > subkey.pub + $ gpg --export-secret-subkeys -a KEY_ID! > subkey + +to get the public and the encryption private subkeys in this specific format. Check that no Authentication subkey is accidentally exported, using: + + $ gpg --show-key subkey + +Finally, copy them to your secured key server."; "GpgAsciiArmorFileExplanation." = "GnuPG supports the command-line option \"-a\" that causes output to be generated in an ASCII-armored format similar to unencoded documents rather than the binary format. Use - $ gpg --export -a KEY_ID - $ gpg --export-secret-keys -a KEY_ID + $ gpg --list-keys -to get the public and the private key in this specific format. Subsequently, copy them to a location accessible by the Files app."; +to identify your encryption (E) subkey, then use: + + $ gpg --export -a KEY_ID! > subkey.pub + $ gpg --export-secret-subkeys -a KEY_ID! > subkey + +to get the public and the encryption private subkeys in this specific format. Check that no Authentication subkey is accidentally exported, using: + + $ gpg --show-key subkey + +Finally, copy them to a location accessible by the Files app.";