Atom Smasher wrote:
has anyone given any thought to what would be the difference between
carefully and carelessly making hard-copy backups of secret keys?
i mean, it would be stupid to print a copy of ones secret key (with a
weak passphrase) and leave it lying on a table next to a window. OTO
has anyone given any thought to what would be the difference between
carefully and carelessly making hard-copy backups of secret keys?
i mean, it would be stupid to print a copy of ones secret key (with a weak
passphrase) and leave it lying on a table next to a window. OTOH, a
printed copy of
Realos wrote:
> What would you suggest in this case? A brute force attack with some
> software if I know part of the password? What tool is suitable for that?
There isn't any software that I know of to brute-force a GnuPG password.
You could probably whip up something quick and dirty using GnuPG's
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Patrick Plattes wrote on 05.01.2006 2:13:
> Realos wrote:
>
>> hello,
>>
>> I have found an old pair of private and public keys but unfortunaltely
>> do no remember the corresponding password. Public key is places on key
>> servers, thus I would
Realos wrote:
hello,
I have found an old pair of private and public keys but unfortunaltely
do no remember the corresponding password. Public key is places on key
servers, thus I would like to have access to it's password again.
What would you suggest in this case? A brute force attack with so
hello,
I have found an old pair of private and public keys but unfortunaltely
do no remember the corresponding password. Public key is places on key
servers, thus I would like to have access to it's password again.
What would you suggest in this case? A brute force attack with some
software if I
On Tue, Jan 03, 2006 at 07:59:08PM -0800, [EMAIL PROTECTED] wrote:
>
> >Message: 8
> >Date: Tue, 3 Jan 2006 19:43:01 -0500
> >From: David Shaw <[EMAIL PROTECTED]>
> >Subject: Re: updating a key's self-signature
>
> >Yes, but note that it's still possible for someone to get the old
> >self-sig fro
On Wed, 04 Jan 2006 09:39:44 +0100, Patrick Plattes said:
> gpg: encrypted with 1024-bit RSA key, ID 37BDF910, created 2005-09-21
> "Patrick Plattes (Mr. Parity) <[EMAIL PROTECTED]>"
> gpg: public key decryption failed: wrong secret key used
I missed this message in my first reply.
> gpg: d
On Wed, 04 Jan 2006 09:39:44 +0100, Patrick Plattes said:
sec> 1024R/F7E086A6 2005-09-21 [expires: 2008-09-20]
> Card serial no. = 0001 04FB
The key is on the card. Check whether the card works:
gpg --card-status
should list the key too.
Salam-Shalom,
Werner
Hello,
i have a problem while encrypting a message. I'm using the OpenPGP Card
but i think the Problem doesn't depends on it.
I've got a an decrypted e-mail and if i try to encrypt the e-mail i got
a "gpg: public key decryption failed: wrong secret key used". The ID of
the used key is an ID
10 matches
Mail list logo