How to Install and Uninstall cryptobone.x86_64 Package on Fedora 35
Last updated: January 12,2025
1. Install "cryptobone.x86_64" package
In this section, we are going to explain the necessary steps to install cryptobone.x86_64 on Fedora 35
$
sudo dnf update
Copied
$
sudo dnf install
cryptobone.x86_64
Copied
2. Uninstall "cryptobone.x86_64" package
Please follow the steps below to uninstall cryptobone.x86_64 on Fedora 35:
$
sudo dnf remove
cryptobone.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the cryptobone.x86_64 package on Fedora 35
Last metadata expiration check: 4:17:01 ago on Wed Sep 7 08:25:01 2022.
Available Packages
Name : cryptobone
Version : 1.3
Release : 8.fc35
Architecture : x86_64
Size : 879 k
Source : cryptobone-1.3-8.fc35.src.rpm
Repository : updates
Summary : Secure Communication Under Your Control
URL : https://crypto-bone.com
License : BSD and Sleepycat and OpenSSL
Description : The Crypto Bone is a secure messaging system that makes sure a user's
: email is always encrypted without burdening the user with the message
: key management. Based on a GUI and a separate daemon, both ease-of-use
: and security are assured by a novel approach to encryption key management.
:
: While the message keys are secured by a daemon running on the Linux machine,
: additional protection can be achieved by using an external device for storing
: encryption keys. This external device can be another Linux computer dedicated
: to this task or a Beagle Bone or a Raspberry Pi. (https://crypto-bone.com)
Available Packages
Name : cryptobone
Version : 1.3
Release : 8.fc35
Architecture : x86_64
Size : 879 k
Source : cryptobone-1.3-8.fc35.src.rpm
Repository : updates
Summary : Secure Communication Under Your Control
URL : https://crypto-bone.com
License : BSD and Sleepycat and OpenSSL
Description : The Crypto Bone is a secure messaging system that makes sure a user's
: email is always encrypted without burdening the user with the message
: key management. Based on a GUI and a separate daemon, both ease-of-use
: and security are assured by a novel approach to encryption key management.
:
: While the message keys are secured by a daemon running on the Linux machine,
: additional protection can be achieved by using an external device for storing
: encryption keys. This external device can be another Linux computer dedicated
: to this task or a Beagle Bone or a Raspberry Pi. (https://crypto-bone.com)