diff options
author | Silvio Rhatto <rhatto@riseup.net> | 2014-08-21 17:23:20 -0300 |
---|---|---|
committer | Silvio Rhatto <rhatto@riseup.net> | 2014-08-21 17:23:20 -0300 |
commit | 85d9524fb48c9a4c27a250a35884502cc25ced5b (patch) | |
tree | 2cb828a65bfc78f1c32f1c1c7e9acf576e3df875 /share/man | |
parent | 78fd93300420b6894d266855a76f894606eade95 (diff) | |
parent | cffe8137d024091d0f1bee9c2484c28d2986febc (diff) | |
download | keyringer-85d9524fb48c9a4c27a250a35884502cc25ced5b.tar.gz keyringer-85d9524fb48c9a4c27a250a35884502cc25ced5b.tar.bz2 |
Imported Upstream version 0.3.7upstream_keyringer_0.3.7
Diffstat (limited to 'share/man')
-rw-r--r-- | share/man/keyringer.1 | 12 | ||||
-rw-r--r-- | share/man/keyringer.1.mdwn | 10 |
2 files changed, 22 insertions, 0 deletions
diff --git a/share/man/keyringer.1 b/share/man/keyringer.1 index 95c236d..82cb520 100644 --- a/share/man/keyringer.1 +++ b/share/man/keyringer.1 @@ -164,6 +164,11 @@ Alias for \f[I]del\f[] action. .RS .RE .TP +.B cp <\f[I]secret\f[]> <\f[I]dest\f[]> +Copy a secret. +.RS +.RE +.TP .B mv <\f[I]secret\f[]> <\f[I]dest\f[]> Rename a secret. .RS @@ -370,6 +375,13 @@ using the \f[I]git\f[] action. Keyringer does not protect data which were not encrypted to a keyring, so be careful when decrypting secrets and writing them to the disk or other storage media. +.PP +Pay special attention that keyringer outputs data to stdout, which could +be easilly spotted by any agent looking directly at you computer screen. +.PP +The xclip action even copies secret data to the X11 clipboard, which can +be accessed by any application running in the user\[aq]s X11 session, so +use this feature carefully. .SH SEE ALSO .PP The \f[I]README\f[] file distributed with Keyringer contains full diff --git a/share/man/keyringer.1.mdwn b/share/man/keyringer.1.mdwn index 407baaa..af098a3 100644 --- a/share/man/keyringer.1.mdwn +++ b/share/man/keyringer.1.mdwn @@ -128,6 +128,9 @@ del <*secret*> rm <*secret*> : Alias for *del* action. +cp <*secret*> <*dest*> +: Copy a secret. + mv <*secret*> <*dest*> : Rename a secret. @@ -284,6 +287,13 @@ Keyringer currently has the following limitations: so be careful when decrypting secrets and writing them to the disk or other storage media. + Pay special attention that keyringer outputs data to stdout, which could + be easilly spotted by any agent looking directly at you computer screen. + + The xclip action even copies secret data to the X11 clipboard, which can + be accessed by any application running in the user's X11 session, so use + this feature carefully. + # SEE ALSO The *README* file distributed with Keyringer contains full documentation. |