diff options
-rw-r--r-- | KIKI-PATTERNS.txt | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/KIKI-PATTERNS.txt b/KIKI-PATTERNS.txt new file mode 100644 index 0000000..ac9646e --- /dev/null +++ b/KIKI-PATTERNS.txt | |||
@@ -0,0 +1,44 @@ | |||
1 | Kiki Patterns | ||
2 | ============= | ||
3 | |||
4 | Although kiki seems at a glance to have a lot of commands, there is a simple | ||
5 | rule for quickly learning six of them at once, by understanding that they are | ||
6 | all actually variations of one command which means 'exchange information'. | ||
7 | |||
8 | The variations come from first choosing one of 3 directions of information flow | ||
9 | (from, to, or both ways), and then choosing from one of 2 different kinds of | ||
10 | filters on information to exchange(public only, or unfiltered). | ||
11 | |||
12 | The 'from' and 'to' are always relative to your $HOME/.gnupgp folder (or | ||
13 | wherever you have configured to be your $GNUPGHOME). A 'from'-command copies | ||
14 | information from your $GNUPGHOME to files in other locations. A 'to'-command | ||
15 | copies information into keyrings inside $GNUPGHOME from other locations. | ||
16 | |||
17 | Consult the table below to learn the six 'exchange-information' commands of | ||
18 | kiki: | ||
19 | |||
20 | from | to | public | secret | ||
21 | --------------|------|----|--------|----------- | ||
22 | import-public | X | | X | | ||
23 | export-public | | X | X | | ||
24 | sync-public | X | X | X | | ||
25 | import-secret | X | | X | X | ||
26 | export-secret | | X | X | X | ||
27 | sync-secret | X | X | X | X | ||
28 | |||
29 | |||
30 | The four columns of this table are explained thusly: | ||
31 | |||
32 | from: information flows out of $GNUPGHOME | ||
33 | to: information flows into $GNUPGHOME | ||
34 | |||
35 | public: public information is copied | ||
36 | secret: private information is copied | ||
37 | |||
38 | Note that the sync-secret command is the most powerful command, capable of | ||
39 | exchanging information of either variety and in either direction and | ||
40 | simultaneously. Indeed, the presence of the other 5 commands is merely to make | ||
41 | kiki less error prone. The idea being, if you use import-public it is | ||
42 | impossible to accidentally copy secret data to your keyring and impossible to | ||
43 | accidentally expose any data at all from your keyring. | ||
44 | |||