How to Install and Uninstall opmsg Package on openSuSE Tumbleweed
Last updated: December 26,2024
1. Install "opmsg" package
Please follow the instructions below to install opmsg on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
opmsg
Copied
2. Uninstall "opmsg" package
Learn how to uninstall opmsg on openSuSE Tumbleweed:
$
sudo zypper remove
opmsg
Copied
3. Information about the opmsg package on openSuSE Tumbleweed
Information for package opmsg:
------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : opmsg
Version : 1.78s-1.16
Arch : x86_64
Vendor : openSUSE
Installed Size : 622.5 KiB
Installed : No
Status : not installed
Source package : opmsg-1.78s-1.16.src
Upstream URL : https://github.com/stealth/opmsg
Summary : File encryption, sign and verify utility
Description :
opmsg is a replacement for gpg which can encrypt/sign/verify your mails or
create/verify detached signatures of local files. Even though the opmsg
output looks similar, the concept is entirely different.
* Perfect Forward Secrecy (PFS) by means of ECDH or DH Kex.
* Native EC or RSA fallback if no (EC)DH keys left.
* Signing messages is mandatory.
* OTR-like deniable signatures if demanded.
* Support for 1:1 key bindings to auto-select source key per
destination.
* Adds the possibility to (re-)route messages different from mail
address to defeat meta data collection.
* Key format suitable for easy use with QR codes.
* Optional cross-domain ECDH Kex.
------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : opmsg
Version : 1.78s-1.16
Arch : x86_64
Vendor : openSUSE
Installed Size : 622.5 KiB
Installed : No
Status : not installed
Source package : opmsg-1.78s-1.16.src
Upstream URL : https://github.com/stealth/opmsg
Summary : File encryption, sign and verify utility
Description :
opmsg is a replacement for gpg which can encrypt/sign/verify your mails or
create/verify detached signatures of local files. Even though the opmsg
output looks similar, the concept is entirely different.
* Perfect Forward Secrecy (PFS) by means of ECDH or DH Kex.
* Native EC or RSA fallback if no (EC)DH keys left.
* Signing messages is mandatory.
* OTR-like deniable signatures if demanded.
* Support for 1:1 key bindings to auto-select source key per
destination.
* Adds the possibility to (re-)route messages different from mail
address to defeat meta data collection.
* Key format suitable for easy use with QR codes.
* Optional cross-domain ECDH Kex.