Recursive Encryption

Steve Butler sbutler@fchn.com
Mon Dec 10 17:03:01 2001


I'd use tar to create the archive and then gnupg to encrypt it.  I haven't
thought about it but you might be able to pipe the output from tar to gnupg
(especially if you use named pipes).

-----Original Message-----
From: Ray Yang [mailto:ray@Princeton.EDU]
Sent: Friday, December 07, 2001 6:21 PM
To: gnupg-users@gnupg.org
Subject: Re: Recursive Encryption 


Hi:
	Sorry for sending a blank response to the list. I hit the wrong
key in my mail reader. As penance, I read through the documentation, and I
don't think there is a way using gpg alone; the way I'd do it would be to
put all the directories into an archive, and then to encrypt the archive. 

Ray

On Fri, 7 Dec 2001, Richard B. Tilley (Brad) wrote:

> Hello GNUpg users and freedom loving people across the world!
> 
> I want to use gnupg from the command line to encrypt many directories and
> files. I thought the easiest way to do this would be to instruct gnupg to
> perform this function recursively, but I can't find info at gnupg.org that
> shows how this can be done and the man pages say nothing about the matter.
> Could someone point me to a source of information that describes how to go
> about this. It is possible... isn't it?
> 
> Thank you all.
> 
> "If I know that everything I know is wrong, does that mean I'm right?"
> "GNU/Linux... may the source be with you!"
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 




_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

CONFIDENTIALITY NOTICE:  This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information.  Any unauthorized review, use, disclosure or distribution is prohibited.  If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.