Hi Lynda, Unfortunately, that's not how it works. Essentially all of us are just users and can't unsubscribe you. Instead, your message was sent to the entire mailing list.
Thankfully, the self-service process is straightforward: if you wish to unsubscribe, just click the link at the bottom of every message sent to the list and follow the directions to unsubscribe. Cheers! -Pete On Aug 24, 2016 18:51, "lynda.har...@sympatico.ca" < lynda.har...@sympatico.ca> wrote: > I have contacted you several times to unsubscribe me please. > > > > > *Lynda Harlos* > Home based travel agent > > Orion Travelinx > > Home office: 905-433-4267 > > Text: 905-723-9210 > > www.facebook.com/TravelAgent.LyndaHarlos > > > > Referrals are the best compliment! > > Any price/s quoted not guaranteed until payment is made > > To unsubscribe please reply with unsubscribe in subject line > *-------Original Message-------* > > *From:* martin <martini5...@gmail.com> > *Date:* 8/24/2016 12:32:12 PM > *To:* gnupg-users@gnupg.org > *Subject:* Re: Attacks on encrypted communicxatiopn rising in Europe > > On 24/08/16 15:37, Robert J. Hansen wrote: > > I find the current state of detente to be pretty good, actually. We're > > allowed to design the best systems we can, and governments are allowed > > to discover where we're not as clever as we think we are. If there's a > > flaw in Tor and the FBI uses it to pierce anonymity and go after a bad > > guy, I can get behind that. Way to go, FBI, you did it right, now > > please hold on while we figure out how you did this and write a patch to > > keep you from doing it again. > > > > I guess you could say my preferred solution to the crypto wars is to > > encourage an ongoing escalating crypto arms race. It's crazy, but it > > seems to work. > > For my €0.02 I think the above is mostly valid bar 2 small details: > > 1. Seldom we do find the FBI breaking security of anonymity tools. Only > if a high profile case shows up or someone leaks it. I think it is even > more rare for the FBI to outright disclose the vulnerability they used > so it can be patched. I don't even know if the other 3 letter agencies > do it. > > 2. Crypto arms race also implies stock piling vulnerabilities - > something Bruce Schneier is very vocal about [1][2]. I think the answer > here is to find a balance of some sort - i.e. keep vulnerabilities in > rare cases for short periods of time and then disclose and patch them. > However for that to work we need to trust the govt. to do the right > thing. Which I think is pretty much the core issue that started this > discussion. > > Regards, > Martin > > [1] Hacking Team, Computer Vulnerabilities, and the NSA - > https://www.schneier.com/blog/archives/2015/09/hacking_team_co.html > [2] Disclosing vs. Hoarding Vulnerabilities - > https://www.schneier.com/blog/archives/2014/05/disclosing_vs_h.html > > > ____________________________________________________________ > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > > > > _______________________________________________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > >
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users