| 
				
			 | 
			
			
				@@ -143,7 +143,7 @@ This system tries to block port scanners. Any other system trying to scan for op 
			 | 
		
	
		
			
			| 
				143
			 | 
			
				143
			 | 
			
			
				 * Should I upload my GPG keys to keybase.io? 
			 | 
		
	
		
			
			| 
				144
			 | 
			
				144
			 | 
			
			
				 It's not recommended unless there exists some compelling reason for you to be on there. That site asks users to upload the *private keys*, and even if the keys are client side encrypted with a passphrase there's always the chance that there will be a data leak in future and letter agencies will then have a full time opportunity to crack the passphrases. 
			 | 
		
	
		
			
			| 
				145
			 | 
			
				145
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				146
			 | 
			
				
			 | 
			
			
				-Saying something resembling /"only noobs will use crackable private key passphrases"/ isn't good enough. A passphrase should not be considered to be a substitute for a private key. 
			 | 
		
	
		
			
			| 
				
			 | 
			
				146
			 | 
			
			
				+Saying something resembling "/only noobs will use crackable private key passphrases/" isn't good enough. A passphrase should not be considered to be a substitute for a private key. 
			 | 
		
	
		
			
			| 
				147
			 | 
			
				147
			 | 
			
			
				 * Keys and emails should not be stored on servers. Why do you do that? 
			 | 
		
	
		
			
			| 
				148
			 | 
			
				148
			 | 
			
			
				 Ordinarily this is good advice. However, the threat model for a device in your home is different from the one for a generic server in a massive warehouse. Compare and contrast: 
			 | 
		
	
		
			
			| 
				149
			 | 
			
				149
			 | 
			
			
				  
			 |