I encrypted a message by:

  1. Typing gpg --encrypt --armor --recipient [recipient]
  2. Hitting enter
  3. Typing the message to be encrypted
  4. Exiting/finishing with “ctrl + d”

However, I needed to press “ctrl + d” twice, for some reason. Maybe a Termux bug? Although I haven’t tried it on a normal Linux distro, so maybe this is normal?

Question: if it isn’t normal, did gpg encode/include the first “ctrld” in the encrypted message? If it did, I need to contact the recipient to tell them to disregard the message… 🤣

Naturally, I cannot reverse the message since it’s encrypted with the recipient’s public key.

    • printf("%s", name);@piefed.blahaj.zoneOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 days ago

      Sorry for spamming. I just tried encrypting it with my own credentials as recipient. Worked like a charm. Thank you so much! :D

      By the way, is --throw-keyidsa countermeasure against man in the middle attacks? Does it assume that the recipient’s private key has been compromised?

      • floquant@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        ·
        8 days ago

        It doesn’t improve any guarantees, it’s strictly an opsec practice. By default you can publicly view the fingerprint of the public key(s) of the recipient(s) to aid in selecting the correct key for decryption, while --throw-keyids removes that metadata. Don’t use it if you want to demonstrate that the message is not additionally encrypted to other keys, i.e. the conversation is confidential. Use it if you don’t want a MitM to know who you’re talking with.