# ~/.gnupg/gpg.conf | gpg (GnuPG) 2.5.13
#
# This gpg.conf is tuned for safety, for a small circle PGP adoption
# in your surroundings, and for comfort.
#
# When you verify a signature, it automatically fetches the
# corresponding public key, if missing, from recommended secure
# sources. Which is a very useful feature (at least to me).
#
# Have fun and safe texting!
# Prefer more modern ciphers over older ones.
personal-cipher-preferences CAMELLIA256 AES256 TWOFISH CAMELLIA192 AES192 CAMELLIA128 AES BLOWFISH
# Prefer strong hashes
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160
# Prefer modern compression
personal-compress-preferences BZIP2 ZLIB ZIP
# Default preferences for new keys
default-preference-list SHA512 SHA384 SHA256 SHA224 RIPEMD160 CAMELLIA256 AES256 TWOFISH CAMELLIA192 AES192 CAMELLIA128 AES BLOWFISH BZIP2 ZLIB ZIP
# SHA512 as digest to sign keys
cert-digest-algo SHA512
# SHA512 as digest for symmetric operations
s2k-digest-algo SHA512
# CAMELLIA256 as cipher for symmetric operations
s2k-cipher-algo CAMELLIA256
# Enable more compression
compress-level 9
bzip2-compress-level 9
# Only run gpg if memory is secured
require-secmem
# Disable banner
no-greeting
# Verbose output
#verbose
# Long hexidecimal key format
keyid-format 0xlong
# Display all keys and their fingerprints in a nice readable format
#with-fingerprint
# Display ownertrust and trust signatures
list-options show-ownertrust show-trustsig
# Show more info on checking signatures
list-options show-policy-urls show-user-notations show-keyserver-urls show-sig-expire
# Show expired subkeys
#list-options show-unusable-subkeys
# Display key origins and updates (still is experimental)
#with-key-origin
# When signing keys, always ask for the cert level
ask-cert-level
# Do update trustdb when needed to
auto-check-trustdb
# Portugal is a peripheric country, with small number of people.
# Let's be moderate with my circle's PGP adoption.
marginals-needed 2
# Disable caching of passphrase for symmetrical operations
no-symkey-cache
# Disable recipient key ID in messages (useful to hide the others
# recipients of a given message)
#throw-keyids
# If you do not pass a recipient to gpg, it will ask for one. Using
# this option you can encrypt to a default key. Key validation will
# not be done in this case. The second form uses the default key as
# default recipient.
#default-recipient some-user-id
default-recipient-self
# Default/trusted key ID to use (also helpful with throw-keyids)
default-key 0x964FC110C40AD575
#trusted-key 0x964FC110C40AD575
# Always encrypt to
#encrypt-to 0x964FC110C40AD575
# Group recipient keys (preferred ID last)
#group keygroup = 0xFF00000000000001 0xFF00000000000002 0xFF3E7D88647EBCDB
# Keyserver URL
#keyserver hkps://pgp.mit.edu
keyserver hkps://keyserver.ubuntu.com:443
#keyserver hkps://pgp.ocf.berkeley.edu
#keyserver hkps://hkps.pool.sks-keyservers.net
#keyserver hkps://keys.gnupg.net
# Proxy to use for keyservers
#keyserver-options http-proxy=
http://127.0.0.1:8118
#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
# WKD key discovery
auto-key-locate local,wkd,dane,cert
#auto-key-locate local,wkd,dane,cert,ldap,keyserver,hkps://keys.gnupg.net
# Retrieve automatically key from Internet when verifying signatures
# wkd if: --sender (is the default if --auto-key-locate has "wkd")
# keyserver if: --sig-keyserver-url
# keyserver if: --keyserver is configured (as it is above)
auto-key-retrieve
# When verifying signatures, automatically import embedded key (if
# --include-key-block was used)
auto-key-import