-#-----------------------------
-# default key
-#-----------------------------
-
# The default key to sign with. If this option is not used, the default key is
# the first key found in the secret keyring
-
#default-key 0xD8692123C4065DEA5E0F3AB5249B39D24F25E3B6
-
-#-----------------------------
-# behavior
-#-----------------------------
-
# Disable inclusion of the version string in ASCII armored output
no-emit-version
# View images with feh
photo-viewer feh %i
-#-----------------------------
-# keyserver
-#-----------------------------
-
-# This is the server that --recv-keys, --send-keys, and --search-keys will
-# communicate with to receive keys from, send keys to, and search for keys on
-# keyserver hkps://hkps.pool.sks-keyservers.net
-# keyserver hkps://hkps.pool.sks-keyservers.net
-
-# Provide a certificate store to override the system default
-# Get this from https://sks-keyservers.net/sks-keyservers.netCA.pem
-# keyserver-options ca-cert-file=/usr/local/etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
-
-# Set the proxy to use for HTTP and HKP keyservers - default to the standard
-# local Tor socks proxy
-# It is encouraged to use Tor for improved anonymity. Preferrably use either a
-# dedicated SOCKSPort for GnuPG and/or enable IsolateDestPort and
-# IsolateDestAddr
-#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
-
-# Don't leak DNS, see https://trac.torproject.org/projects/tor/ticket/2846
-# keyserver-options no-try-dns-srv
-
# When using --refresh-keys, if the key in question has a preferred keyserver
# URL, then disable use of that preferred keyserver to refresh the key from
keyserver-options no-honor-keyserver-url
# the keyserver as revoked
keyserver-options include-revoked
-
-#-----------------------------
-# algorithm and ciphers
-#-----------------------------
-
# list of personal digest preferences. When multiple digests are supported by
# all recipients, choose the strongest one
personal-cipher-preferences AES256 AES192 AES CAST5