How to Install and Uninstall opmsg Package on openSUSE Leap
Last updated: November 07,2024
1. Install "opmsg" package
Please follow the steps below to install opmsg on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
opmsg
Copied
2. Uninstall "opmsg" package
Please follow the step by step instructions below to uninstall opmsg on openSUSE Leap:
$
sudo zypper remove
opmsg
Copied
3. Information about the opmsg package on openSUSE Leap
Information for package opmsg:
------------------------------
Repository : Main Repository
Name : opmsg
Version : 1.78s-bp155.2.12
Arch : x86_64
Vendor : openSUSE
Installed Size : 614.6 KiB
Installed : No
Status : not installed
Source package : opmsg-1.78s-bp155.2.12.src
Upstream URL : https://github.com/stealth/opmsg
Summary : File encryption, sign and verify utility
Description :
opmsg is a replacement for gpg which can encrypt/sign/verify your mails or
create/verify detached signatures of local files. Even though the opmsg
output looks similar, the concept is entirely different.
* Perfect Forward Secrecy (PFS) by means of ECDH or DH Kex.
* Native EC or RSA fallback if no (EC)DH keys left.
* Signing messages is mandatory.
* OTR-like deniable signatures if demanded.
* Support for 1:1 key bindings to auto-select source key per
destination.
* Adds the possibility to (re-)route messages different from mail
address to defeat meta data collection.
* Key format suitable for easy use with QR codes.
* Optional cross-domain ECDH Kex.
------------------------------
Repository : Main Repository
Name : opmsg
Version : 1.78s-bp155.2.12
Arch : x86_64
Vendor : openSUSE
Installed Size : 614.6 KiB
Installed : No
Status : not installed
Source package : opmsg-1.78s-bp155.2.12.src
Upstream URL : https://github.com/stealth/opmsg
Summary : File encryption, sign and verify utility
Description :
opmsg is a replacement for gpg which can encrypt/sign/verify your mails or
create/verify detached signatures of local files. Even though the opmsg
output looks similar, the concept is entirely different.
* Perfect Forward Secrecy (PFS) by means of ECDH or DH Kex.
* Native EC or RSA fallback if no (EC)DH keys left.
* Signing messages is mandatory.
* OTR-like deniable signatures if demanded.
* Support for 1:1 key bindings to auto-select source key per
destination.
* Adds the possibility to (re-)route messages different from mail
address to defeat meta data collection.
* Key format suitable for easy use with QR codes.
* Optional cross-domain ECDH Kex.