aboutsummaryrefslogtreecommitdiff
path: root/share/man
diff options
context:
space:
mode:
authorSilvio Rhatto <rhatto@riseup.net>2014-08-21 17:23:20 -0300
committerSilvio Rhatto <rhatto@riseup.net>2014-08-21 17:23:20 -0300
commit85d9524fb48c9a4c27a250a35884502cc25ced5b (patch)
tree2cb828a65bfc78f1c32f1c1c7e9acf576e3df875 /share/man
parent78fd93300420b6894d266855a76f894606eade95 (diff)
parentcffe8137d024091d0f1bee9c2484c28d2986febc (diff)
downloadkeyringer-85d9524fb48c9a4c27a250a35884502cc25ced5b.tar.gz
keyringer-85d9524fb48c9a4c27a250a35884502cc25ced5b.tar.bz2
Imported Upstream version 0.3.7upstream_keyringer_0.3.7
Diffstat (limited to 'share/man')
-rw-r--r--share/man/keyringer.112
-rw-r--r--share/man/keyringer.1.mdwn10
2 files changed, 22 insertions, 0 deletions
diff --git a/share/man/keyringer.1 b/share/man/keyringer.1
index 95c236d..82cb520 100644
--- a/share/man/keyringer.1
+++ b/share/man/keyringer.1
@@ -164,6 +164,11 @@ Alias for \f[I]del\f[] action.
.RS
.RE
.TP
+.B cp <\f[I]secret\f[]> <\f[I]dest\f[]>
+Copy a secret.
+.RS
+.RE
+.TP
.B mv <\f[I]secret\f[]> <\f[I]dest\f[]>
Rename a secret.
.RS
@@ -370,6 +375,13 @@ using the \f[I]git\f[] action.
Keyringer does not protect data which were not encrypted to a keyring,
so be careful when decrypting secrets and writing them to the disk or
other storage media.
+.PP
+Pay special attention that keyringer outputs data to stdout, which could
+be easilly spotted by any agent looking directly at you computer screen.
+.PP
+The xclip action even copies secret data to the X11 clipboard, which can
+be accessed by any application running in the user\[aq]s X11 session, so
+use this feature carefully.
.SH SEE ALSO
.PP
The \f[I]README\f[] file distributed with Keyringer contains full
diff --git a/share/man/keyringer.1.mdwn b/share/man/keyringer.1.mdwn
index 407baaa..af098a3 100644
--- a/share/man/keyringer.1.mdwn
+++ b/share/man/keyringer.1.mdwn
@@ -128,6 +128,9 @@ del <*secret*>
rm <*secret*>
: Alias for *del* action.
+cp <*secret*> <*dest*>
+: Copy a secret.
+
mv <*secret*> <*dest*>
: Rename a secret.
@@ -284,6 +287,13 @@ Keyringer currently has the following limitations:
so be careful when decrypting secrets and writing them to the disk or
other storage media.
+ Pay special attention that keyringer outputs data to stdout, which could
+ be easilly spotted by any agent looking directly at you computer screen.
+
+ The xclip action even copies secret data to the X11 clipboard, which can
+ be accessed by any application running in the user's X11 session, so use
+ this feature carefully.
+
# SEE ALSO
The *README* file distributed with Keyringer contains full documentation.