gpg --full-generate-key
gpg --list-secret-keys --keyid-format LONG
gpg --edit-key 0261567733AE82EA
Split the private key in two parts, encrypt each part one by one using simple symmetric encryption with strong password. Dispatch both privatekeyN
parts in safe places (usb keys for example).
gpg --export-secret-keys --armor me@somewhere.com > privatekey
split -n 2 privatekey --numeric-suffix privatekey
gpg --symmetric privatekey00
gpg --symmetric privatekey01
gpg --output ~/revocation.crt --gen-revoke
chmod 600 ~/revocation.crt
gpg --output ~/mypublic.key --armor --export me@somewhere.com
gpg --send-keys --keyserver keys.openpgp.org AB173AEFA2C0E586357C82610261567733AE82EA
gpg --refresh-keys
gpg --refresh-keys --keyserver keys.openpgp.org
gpg --keyserver hkps.pool.sks-keyservers.net --search-keys someone@somewhere.com
gpg --fingerprint someone@somewhere.com
gpg --import someones.key
gpg --sign-key someonek@somewhere.com
gpg --encrypt --sign --armor -r someone@somewhere.com
gpg --decrypt coded.asc > plain.txt
gpg --default-key E8C43461 --sign-key 6AA15948