[10:24] <drakonslayor> Hi, wondering if anyone here can help me out
[11:53] <Tribaal> drakonslayor: if you expose your problem, maybe we can determine that :)
[11:55] <drakonslayor> been trying to extract a public gpg key with seahorse and for the life of me have no idea how
[11:56] <drakonslayor> apparently older versions had a simple button... but for some reason they got rid of that
[11:57] <Tribaal> drakonslayor: how about "gpg --export --armor <keyID>" ?
[11:58] <Tribaal> or is that not what you ask?
[11:58] <drakonslayor> is that how you extract the public key?
[11:58] <drakonslayor> lol
[11:58] <drakonslayor> sorry new to the whole thing
[11:58] <Tribaal> drakonslayor: that is how you get a public key block yeah
[11:59] <Tribaal> what are you trying to "extract the public key" for?
[11:59] <Tribaal> if you want to i.e. host it on your blog, then that's what you should put up (gpg --export --armor <keyid>)
[12:00] <drakonslayor> to give to my friend so he can decrypt my encrypted data
[12:00] <Tribaal> ah
[12:00] <Tribaal> so, what I said is one option
[12:00] <Tribaal> the other option is to use a keyserver
[12:00] <Tribaal> uploading your public key there makes it searchable
[12:01] <Tribaal> but before you do, you must generate a revocation certificate if you haven't already
[12:01] <Tribaal> you *MUST*
[12:01] <Tribaal> since it's impossible to delete keys once uploaded
[12:01] <Tribaal> :)
[12:02] <Tribaal> drakonslayor: wait a second - if you give your public key to your friend he can *encrypt secret messages to you*
[12:02] <Tribaal> but he cannot decrypt what you encrypt
[12:03] <Tribaal> you need *his* public key for that :)
[12:03] <drakonslayor> yeah sorry i said that the wrong way around :P
[12:03] <Tribaal> oh ok :)
[12:03] <drakonslayor> thanks
[12:04] <Tribaal> drakonslayor: don't hesitate to ping me if you need more help with gpg - I'll do my best :)
[12:05] <drakonslayor> thanks :)