From 4a02a243f304182a98622f35826ced7aee847c97 Mon Sep 17 00:00:00 2001 From: "wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d" Date: Wed, 16 Dec 2015 11:21:48 +0000 Subject: [PATCH] Added a comment --- .../comment_4_56994d9252e8651b3f33044f5c8599b3._comment | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_56994d9252e8651b3f33044f5c8599b3._comment diff --git a/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_56994d9252e8651b3f33044f5c8599b3._comment b/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_56994d9252e8651b3f33044f5c8599b3._comment new file mode 100644 index 0000000000..fbfa254ffa --- /dev/null +++ b/doc/forum/Future_proofing___47___disaster_recovery_with_an_encrypted_special_remote/comment_4_56994d9252e8651b3f33044f5c8599b3._comment @@ -0,0 +1,7 @@ +[[!comment format=mdwn + username="wsha.code+ga@b38779424f41c5701bbe5937340be43ff1474b2d" + subject="comment 4" + date="2015-12-16T11:21:48Z" + content=""" +Decrypting the cipher for `hybrid` and `pubkey` remotes is actually pretty straightforward: `echo -n | base64 -d | gpg --decrypt`. I think with that I have enough to put together a short summary of decrypting by hand the contents of `hybrid`, `pubkey`, and `shared` special remotes. +"""]]