NAME

strip - Strips a User ID

SYNOPSIS

strip [-o|--output] [-u|--userid] [-B|--binary] [-h|--help] [FILE]

DESCRIPTION

Strips a User ID
Note that this operation does not reliably remove User IDs from a certificate that has already been disseminated! (OpenPGP software typically appends new information it receives about a certificate to its local copy of that certificate. Systems that have obtained a copy of your certificate with the User ID that you are trying to strip will not drop that User ID from their copy.)
In most cases, you will want to use the 'sq revoke userid' operation instead. That issues a revocation for a User ID, which can be used to mark the User ID as invalidated.
However, this operation can be useful in very specific cases, in particular: to remove a mistakenly added User ID before it has been uploaded to key servers or otherwise shared.
Stripping a User ID may change how a certificate is interpreted. This is because information about the certificate like algorithm preferences, the primary key's key flags, etc. is stored in the User ID's binding signature.

OPTIONS

-o, --output=FILE
Writes to FILE or stdout if omitted
-u, --userid=USERID
The User IDs to strip. Values must exactly match a User ID.
-B, --binary
Emits binary data
-h, --help
Print help information
[FILE]
Reads from FILE or stdin if omitted

EXAMPLES


First, this generates a key
 sq key generate --userid "<[email protected]>" --export juliet.key.pgp


Then, this strips a User ID
 sq key userid strip --userid "<[email protected]>" \


--output juliet-new.key.pgp juliet.key.pgp

SEE ALSO

For the full documentation see <https://docs.sequoia-pgp.org/sq/>.
sq(1) sq-armor(1) sq-autocrypt(1) sq-certify(1) sq-dearmor(1) sq-decrypt(1) sq-encrypt(1) sq-inspect(1) sq-key(1) sq-key-adopt(1) sq-key-attest-certifications(1) sq-key-extract-cert(1) sq-key-generate(1) sq-key-password(1) sq-key-userid(1) sq-key-userid-add(1) sq-keyring(1) sq-keyserver(1) sq-packet(1) sq-revoke(1) sq-sign(1) sq-verify(1) sq-wkd(1)