Provided by: sq_0.27.0-2_amd64
NAME
strip - Strips a User ID
SYNOPSIS
strip [-o|--output] [-u|--userid] [-B|--binary] [-h|--help] [FILE]
DESCRIPTION
Strips a User ID Note that this operation does not reliably remove User IDs from a certificate that has already been disseminated! (OpenPGP software typically appends new information it receives about a certificate to its local copy of that certificate. Systems that have obtained a copy of your certificate with the User ID that you are trying to strip will not drop that User ID from their copy.) In most cases, you will want to use the 'sq revoke userid' operation instead. That issues a revocation for a User ID, which can be used to mark the User ID as invalidated. However, this operation can be useful in very specific cases, in particular: to remove a mistakenly added User ID before it has been uploaded to key servers or otherwise shared. Stripping a User ID may change how a certificate is interpreted. This is because information about the certificate like algorithm preferences, the primary key's key flags, etc. is stored in the User ID's binding signature.
OPTIONS
-o, --output=FILE Writes to FILE or stdout if omitted -u, --userid=USERID The User IDs to strip. Values must exactly match a User ID. -B, --binary Emits binary data -h, --help Print help information [FILE] Reads from FILE or stdin if omitted
EXAMPLES
First, this generates a key sq key generate --userid "<juliet@example.org>" --export juliet.key.pgp Then, this strips a User ID sq key userid strip --userid "<juliet@example.org>" \ --output juliet-new.key.pgp juliet.key.pgp
SEE ALSO
For the full documentation see <https://docs.sequoia-pgp.org/sq/>. sq(1) sq-armor(1) sq-autocrypt(1) sq-certify(1) sq-dearmor(1) sq-decrypt(1) sq-encrypt(1) sq-inspect(1) sq-key(1) sq-key-adopt(1) sq-key-attest-certifications(1) sq-key-extract-cert(1) sq-key-generate(1) sq-key-password(1) sq-key-userid(1) sq-key-userid-add(1) sq-keyring(1) sq-keyserver(1) sq-packet(1) sq-revoke(1) sq-sign(1) sq-verify(1) sq-wkd(1)