FAQ
Frequently asked questions about pgpilot and OpenPGP.
General
Section titled “General”What’s the difference between a public and private key?
Section titled “What’s the difference between a public and private key?”- Public key: Safe to share. Used to encrypt messages to you. Anyone can have it.
- Private key: Secret. Used to decrypt messages and sign. Never share.
Think: public key = mailbox (anyone can drop letters); private key = key to your mailbox (only you).
Why don’t my keys expire?
Section titled “Why don’t my keys expire?”pgpilot creates keys that never expire by design. Subkeys expire (after 1, 2, or 5 years), but the master key is permanent.
Why? Expiring master keys is more complex and rare. Subkey rotation (Replace) is the modern best practice.
If you need expiring keys, use gpg directly: gpg --quick-gen-key "Name" ed25519 cert 1y.
What’s a fingerprint? What’s a Key ID?
Section titled “What’s a fingerprint? What’s a Key ID?”-
Fingerprint: 40 hexadecimal characters. Unique identifier for your key.
- Example:
ABCD1234567890ABCD1234567890ABCD1234567890 - Always verify this in person before trusting someone’s key
- Example:
-
Key ID: Last 16 characters of fingerprint (long ID) or last 8 characters (short ID).
- Long ID:
1234567890ABCDEF - Short ID:
90ABCDEF(⚠️ Not recommended — trivially collisible)
- Long ID:
pgpilot always uses full 40-character fingerprints.
Why separate subkeys?
Section titled “Why separate subkeys?”Three subkeys (Sign, Encryption, Auth) allow:
- Rotation: Refresh subkeys without changing your identity
- Delegation: Share subkeys with services without sharing master key
- Hardware: Move individual subkeys to YubiKey
- Specialization: Each key optimized for its purpose
This is modern best practice.
Can I revoke a key?
Section titled “Can I revoke a key?”Revocation marks a key as no longer valid (e.g., it’s compromised or lost).
In pgpilot: You cannot revoke the master key (pgpilot has no UI for this). For emergencies, use:
gpg --gen-revoke <fingerprint> > revocation.ascgpg --import revocation.ascgpg --keyserver keys.openpgp.org --send-keys <fingerprint>Subkeys: Use Replace in pgpilot to revoke old subkeys and create new ones.
Keys and Keyrings
Section titled “Keys and Keyrings”Where does pgpilot store my keys?
Section titled “Where does pgpilot store my keys?”In the standard GnuPG home directory:
- Linux:
~/.gnupg/ - macOS:
~/.gnupg/or/Users/<username>/.gnupg/ - Windows:
%APPDATA%\gnupg\
pgpilot doesn’t create its own keyring — it delegates to gpg.
Can I use pgpilot with keys created by gpg?
Section titled “Can I use pgpilot with keys created by gpg?”Yes! pgpilot reads and manages any GPG keyring. You can:
- Create keys with
gpgand manage them in pgpilot - Create keys in pgpilot and use them with
gpg
They’re fully compatible.
How do I backup my private key?
Section titled “How do I backup my private key?”- In pgpilot: Select your key → Click Backup → Choose a folder
- pgpilot exports:
<KeyID>_secret.asc— your private key (encrypted)<KeyID>_revocation.rev— revocation certificate
Store the backup somewhere secure (offline, encrypted external drive, safe).
How do I restore a backup?
Section titled “How do I restore a backup?”- Copy the
_secret.ascfile to a safe location - In pgpilot: Click Import → File → choose the
.ascfile - pgpilot imports your key back
Your backup passphrase is required to re-import.
Trust and Verification
Section titled “Trust and Verification”What’s “trust level”?
Section titled “What’s “trust level”?”Trust tells pgpilot how much you believe in someone’s identity:
- Undefined: You haven’t verified (default)
- Marginal: You’ve partially verified (e.g., verified identity but not fingerprint)
- Full: You’ve fully verified (met in person, compared fingerprints)
- Ultimate: You own this key (your own keys auto-set to Ultimate)
pgpilot warns before encrypting to Undefined keys.
When should I set trust?
Section titled “When should I set trust?”After you:
- Meet someone in person
- Ask them to say their fingerprint
- Verify it matches their key in pgpilot
- Set trust to Full
Never set trust to Full based on email alone.
How do I verify a signature?
Section titled “How do I verify a signature?”- Get the file (e.g.,
document.pdf) - Get the signature (e.g.,
document.pdf.sig) - In pgpilot: Click Verify → choose file and signature
- pgpilot shows result (Valid / Bad Sig / Unknown Key / Expired / Revoked)
If Valid and signer trust is Full/Ultimate, the document is authentic and from who you think.
Sharing and Publishing
Section titled “Sharing and Publishing”Should I publish my key to a keyserver?
Section titled “Should I publish my key to a keyserver?”Yes, if you want people to find you by email. Once published:
- Others search for
your@email.com - They find and download your public key
- They can send you encrypted messages
Publishing is safe — it’s public information.
Which keyserver should I use?
Section titled “Which keyserver should I use?”- keys.openpgp.org (recommended): Privacy-respecting, requires email verification
- keyserver.ubuntu.com: Traditional, lists emails publicly
Most people use keys.openpgp.org now.
What happens when I publish?
Section titled “What happens when I publish?”pgpilot calls gpg --send-keys <fingerprint> to:
- Upload your public key (not private!)
- Keyserver indexes it by fingerprint + email
- Anyone can now download your public key
Your private key never leaves your computer.
Can I remove my key from a keyserver?
Section titled “Can I remove my key from a keyserver?”Once published, keys persist (they can’t be truly deleted from distributed keyservers). You can:
- Revoke the key (marks it as invalid)
- Set privacy options (keys.openpgp.org supports hiding your email)
For complete removal, contact the keyserver admins.
Subkeys
Section titled “Subkeys”Why do subkeys expire?
Section titled “Why do subkeys expire?”Expiring subkeys force you to rotate them periodically. If a subkey leaks, you only need to rotate that subkey, not your identity.
pgpilot defaults to 2 years, but you can choose 1 or 5 years.
What’s the difference between “Renew” and “Replace”?
Section titled “What’s the difference between “Renew” and “Replace”?”-
Renew: Extend the expiry date of the same subkey
- Use if the subkey is still good, just old
- Quick operation
-
Replace: Create a new subkey and revoke the old one
- Use if the subkey is compromised or you want to refresh
- Creates a new key with fresh parameters
- Old key is marked revoked
Can I have multiple Sign keys?
Section titled “Can I have multiple Sign keys?”Yes. Use Add Subkey to add extra Sign subkeys. You can have:
- Multiple Sign keys (e.g., one for work, one for personal)
- Multiple Encrypt keys (for future algorithm migration)
- Multiple Auth keys (for different SSH identities)
But you need at least one of each for most operations.
Encryption
Section titled “Encryption”Who can decrypt my encrypted files?
Section titled “Who can decrypt my encrypted files?”Only the recipients you specified. Each recipient uses their private key to decrypt.
You cannot decrypt files encrypted for others (even if you created them).
What if I lose my private key?
Section titled “What if I lose my private key?”Without the private key:
- You cannot decrypt files encrypted to you
- You cannot sign documents as you
- You cannot use SSH with your Auth key
This is why backup is critical. If lost:
- Revoke the key (publish revocation)
- Create a new key
- Tell everyone your new key
Prevention: Back up now (see “How do I backup my private key?” above).
Should I encrypt files to myself?
Section titled “Should I encrypt files to myself?”Often, yes! Before sending to someone:
- Encrypt a test file to yourself
- Decrypt it to verify it works
- Then encrypt to the real recipient
This catches mistakes before sending.
Security
Section titled “Security”Is pgpilot secure?
Section titled “Is pgpilot secure?”pgpilot is a GUI wrapper around gpg. Security depends on:
- GnuPG: Mature, battle-tested (used by billions)
- Your system: Protect your computer, keep OS updated
- Your keys: Use strong passphrases, back up, rotate compromised keys
- Your choices: Verify fingerprints before trusting
pgpilot is no worse than using gpg directly.
What if my computer is hacked?
Section titled “What if my computer is hacked?”Hacker gains access to:
- Your private keys (on disk, if not on YubiKey)
- Your passphrases (if typed after infection)
- Decrypted files (if stolen or read)
Mitigation:
- Use a YubiKey (keys never leave hardware)
- Use strong passphrases (slows brute-force)
- Keep OS patched (fewer zero-days)
- Revoke compromised keys immediately
What’s the master key for?
Section titled “What’s the master key for?”The master key certifies (signs) your subkeys. Only the master key can:
- Create new subkeys
- Revoke subkeys
- Add user IDs (email addresses)
- Sign other keys (for key signing parties)
The master key is long-term and should be kept secure (ideally offline or on hardware).
Should I keep my master key on disk?
Section titled “Should I keep my master key on disk?”Best practice:
- On disk: Keep a backup offline (USB in safe)
- On hardware: Migrate subkeys to YubiKey, leave master key on disk (you rarely use it)
- Offline: Air-gapped machine (most paranoid, rarely needed)
For most people: on disk with a strong passphrase is fine.
Troubleshooting
Section titled “Troubleshooting”pgpilot won’t start
Section titled “pgpilot won’t start”See Installation — verify GnuPG and pinentry are installed.
Password prompt doesn’t appear
Section titled “Password prompt doesn’t appear”See Troubleshooting — pinentry section.
Keys won’t import
Section titled “Keys won’t import”Check Troubleshooting — import section.
YubiKey not detected
Section titled “YubiKey not detected”See Troubleshooting — YubiKey section.
More questions?
Section titled “More questions?”- See Troubleshooting for common issues
- See Security for threat models
- Email: guillaume+code@friloux.me (not monitored 24/7; use GitHub issues for bugs)