Re: How true can this be?

2008-02-09 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Janusz A. Urbanowicz wrote:
> On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> -  Original Message  
>> Subject: Re: How true can this be?
>> From: Janusz A. Urbanowicz <[EMAIL PROTECTED]>
>> To: Raygene <[EMAIL PROTECTED]>
>> Cc: gnupg-users@gnupg.org
>> Date: Sunday, January 27, 2008 1:39:04 PM
>>
>>
>>> if a), then b) would land him in jail, quickly
>> More likely a fatal traffic accident or victim of a street mugging with
>> similar outcome.  People communicate in and from Jails.
> 
> Blabbering about classified stuff is a breach of security procedures and
> NDA-s, that leads to administrative action, prosecution and usually jail
> sentence (or a hefty fine).

Long ago I had a secret security clearance. The secrets were laughable, but
I have never disclosed them. Mine had nothing to do with encryption.

When getting the clearance, I had to read some of the laws that pertained.
In addition to jail and fines, another punishment option was death. But I
imagine it would be done officially.
> 
> The approach you mention would be probably used on someone who would like to
> play the game (as in sell the info to another country), not for some random
> blabberer.
> 
> Alex


- --
  .~.  Jean-David Beyer  Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A Registered Machine   241939.
 /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
 ^^-^^ 12:50:01 up 16 days, 2:36, 2 users, load average: 5.02, 5.03, 4.68
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org

iD8DBQFHrejkPtu2XpovyZoRAgC9AJ9DknvNBSUr0NU7jxdHUr3PGWHKYACgg2Lo
eVMtegDw54+UQDnlz+fGK+8=
=YzkQ
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPGee development restarted - need bugs

2008-02-09 Thread Kurt Fitzner
After almost two years of neglect, I've got time enough to start working 
on GPGee again.  I was informed some time ago that work is underway to 
replace it.  I don't see a replacement yet, so I'm going to put out a 
release that fixes some bugs and incorporates a French translation I was 
given.  This can act as a stop-gap until the replacement is completed. 
If the replacement is going to be some time yet, I'll also entertain 
requests for new features.


Bugs I've fixed so far include:
- Disappearing keys (requires GnuPG >= 1.4 to fix)
- Verifications of signatures made with expired subkeys not showing the 
correct expiry date of the subkey and giving incorrect warnings of 
signatures being made after the key expired
- Password requests not showing correct data (type & size) for the 
subkey identified

- SHA224 signatures not being correctly identified

If you are still using GPGee (or want to) and have experienced bugs not 
mentioned above, please respond here, on a thread I've made in the GPGee 
forums 
(http://www.excelcia.org/modules.php?name=Forums&file=viewforum&f=1), or 
by personal e-mail to me.


I apologize for any previous e-mails that haven't been replied to.

Regards,

Kurt Fitzner



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-09 Thread Kevin Hilton
>Twofish is almost entirely abandoned nowadays, but it still exists in
>PGP and GnuPG.  Once a bad decision is made in engineering, the
>engineers are stuck supporting it forever.

Is this statement really true or just opinion?  Bruce Schneier is one
of my favorite cryptoanalysts.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-09 Thread Robert J. Hansen
Kevin Hilton wrote:
> Is this statement really true or just opinion?  Bruce Schneier is one
> of my favorite cryptoanalysts.

Bruce recommends against using Twofish for crypto applications.

He has never backed off from either of two claims:

1.  Twofish is a secure cipher that would have made an
excellent AES.
2.  People should use AES for symmetric crypto needs.

He has said #1 many times and keeps a page on his site devoted to the
most recent research into Twofish.  He has said #2 many times,
particularly in his book _Practical Cryptography_.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users