Encrypt to a key without importing it to keyring

Seby seby2kt14 at gmail.com
Fri Nov 24 10:01:10 CET 2017

"Ingo Klöcker" <kloecker at kde.org> wrote:

On Freitag, 24. November 2017 02:44:08 CET Seby wrote:
> Back to the subject, saving to at least a temporary keyring is my only
> solution? Nothing else I can use in batch mode to serve the armored
> key from clipboard somehow and do the operation?


> If this is the only solution, what are the safety recommendations for
> a use case where many many parallel requests will be sent to do
> operations (possibly even using the same public key) so things don't
> break? Does it help if I randomize --homedir and make it different
> with every request / command?

A possible solution for many parallel requests (you need to verify its
viability) could be some kind of containerization (e.g. Docker or something
more low-level). If every request is handled by a new container then all
operations are nicely isolated and nothing can break.


Thanks for the answer. If i run the command every time in a different shell
or with a different user, will this help? I am not familiar with docker.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20171124/5fed417c/attachment.html>

More information about the Gnupg-users mailing list