gpg: Use builtin tor method
Alan Pearce alan@alanpearce.eu
Fri, 25 Aug 2017 23:40:27 +0200
2 files changed, 5 insertions(+), 2 deletions(-)
M gnupg/.gnupg/dirmngr.conf → gnupg/.gnupg/dirmngr.conf
@@ -1,1 +1,4 @@-hkp-cacert = .gnupg/sks-keyservers.netCA.pem+keyserver hkps://hkps.pool.sks-keyservers.net +keyserver hkp://jirk5u4osbsr34t5.onion +use-tor +#hkp-cacert ~/.gnupg/sks-keyservers.netCA.pem
M gnupg/.gnupg/gpg.conf → gnupg/.gnupg/gpg.conf
@@ -54,7 +54,7 @@ # local Tor socks proxy # It is encouraged to use Tor for improved anonymity. Preferrably use either a # dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and # IsolateDestAddr -keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 +# keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 # When using --refresh-keys, if the key in question has a preferred keyserver # URL, then disable use of that preferred keyserver to refresh the key from