You can print your ticket any time before departure at any self-service terminal or ticket office.
We have gathered here a lot of information about configuring Gnu PG.
You must keep it up to date so that critical security flaws are fixed. If you are running: If you do not regularly refresh your public keys, you do not get timely expirations or revocations, both of which are very important to be aware of! Then, you have to configure your machine to receive key updates in a regular fashion.
Most Open PGP clients come configured with a single, specific keyserver.
Therefore, we recommend using the sks keyservers pool.
The machines in this pool have regular health checks to ensure that they are functioning properly.
Note also that an attacker could designate a keyserver that they control to monitor when or from where you refresh their key.
Now that you have configured a good keyserver, you need to make sure that you are regularly refreshing your keys.
The best way to do this on Debian and Ubuntu is to use parcimonie: Parcimonie is a daemon that slowly refreshes your keyring from a keyserver over Tor -.
It uses a randomized sleep, and fresh Tor circuits for each key.
In order to use hkps, you will first need to install gnupg-curl: Then, to use this keyserver pool, you will need to download the CA, and save it somewhere on your machine.
Please remember the path that you save the file to!
Next, you should verify the certificate’s finger print.