shirish wrote:
> Also what do u guys think of Mr. Casey Jones, do u think he's right
> at the above.
Werner posted that the keys should be identical between the versions, so
I guess my suggestion shouldn't be necessary. Therefore I withdraw my
suggestion. It still might be worth a try though.
How about bar code? I don't know long it would be to hold a key though.
That might exceed the capabilities of some bar-code scanners.
--
PGP Fingerprint:
C54A C9DD 84AD C6FC D343 67C4 5195 D63A CD55 18C7
On Tuesday, May 15, 2007, at 12:23AM, "Roscoe" <[EMAIL PROTECTED]> wrote:
>Hey folks,
>
On 5/15/07, Casey Jones <[EMAIL PROTECTED]> wrote:
> There appears to be an open source project going for PDF417
> http://en.wikipedia.org/wiki/PDF417
We've used PDF417 for conference attendee badges in the past. They
work well, and there seems to be quite a bit of hardware and software
out there
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Thanks for all the helpful posts.
I think I will go with just using my Linux laptop for it. I can just encrypt
the swap, it's not difficult, I've played with cryptoloop before. I didn't
use it for swap, but it's identical. And while I'm at it, I'll ju
On Tue, 15 May 2007 08:22, [EMAIL PROTECTED] said:
> it. Firepg kept telling me that the signature is not valid. Thinking
> it was an issue with the extension per-se made a post about the same
> in firepg & was consequently banned. Although there was no explanation
I don't know firepg so I can't
On Dienstag, 15. Mai 2007, Henry Hertz Hobbit wrote:
> Thomas Vollmer wrote:
>
>
>
> First, at this point I am reluctant to have all of this in the
> newsgroup. I am strongly in favor of giving only what works
> there. I don't think most people are interested in all of the
> nitty gritty details
Roscoe wrote:
>Does anyone :
>
> Know of a system that can take binary data and output an image to be
> printed out, that is then capable of extracting that binary data from
> an imperfect scan of the image.
The wiki page on barcodes
http://en.wikipedia.org/wiki/Barcode
has a list of 2d barcodes
On 5/15/07, Alessandro Vesely <[EMAIL PROTECTED]> wrote:
> Virtual memory is a feature that an OS can expose to apps. Memory mapped
> files are an example. On Linux there are both shm and mmap. Traditional
> SysV stuff may better suit inter-process sharing, while more recent APIs
> emphasize multi-
On Mon, May 14, 2007 at 01:23:13PM -0500, Andrew Berg wrote:
> Sven Radde wrote:
> > unless you can calculate SHA-1 values in your head...
> I know it's off topic, but how hard would that be? I've never looked
> over the algorithm.
As someone who has just implemented a hardware SHA-1/256 engine, "
> Is it not legitimate then to discuss what level of trust it
> deserves and what level of trust is sufficient for what purpose?
'Legitimate' is a bad word to use. Is it legitimate? Sure, I guess,
as long as you live in a nation with strong freedom of speech laws.
If you live in Cuba, you
Peter S. May wrote:
> Peter Lebbing wrote:
>> an editor which will not leak the text in any way, so locking it's pages in
>> memory so they won't be swapped out, and other angles of attack.
> ...
>
> (Developers familiar with swap-locked memory: I'd appreciate at least a
> short explanation of ho
> Know of a system that can take binary data and output an image to be
> printed out, that is then capable of extracting that binary data from
> an imperfect scan of the image.
QR coding is pretty nice. 3kb of binary storage per bitmap, and it's
an international standard: ISO/IEC 18004. There
Hi all,
I made my personal key in Ubuntu 7.04 by the default gpg
--gen key command. I use. Then to use it, was using firepg to sign
it. Firepg kept telling me that the signature is not valid. Thinking
it was an issue with the extension per-se made a post about the same
in firepg & was con
Robert J. Hansen wrote:
> I apologize if I sound terse here, but this conversation has (IMO)
> jumped the shark.
>
>> But how can we be confident?
>
> Cf. Thompson, K. _Reflections on trusting trust_. Comm. ACM 27, 8
> (Aug. 1984), 761-763.
>
> A digital version of it is currently available
> David Wheeler recently published a paper which explains how to
> overcome
> this problem:
Fascinating. I'm not sure that it overcomes the problem, but
detection is probably 90% of the fight anyway. Thanks for the link!
[goes off to read the paper again]
_
On Montag, 14. Mai 2007, Henry Hertz Hobbit wrote:
> You wrote:
> > I use my standard text edit for this. It is vim with the
> > gnupg plugin from Markus Braun:
> >
> > http://vim.sourceforge.net/scripts/script.php?script_id=661
> > installed.
Please keep the discussion in the mailing list.
> THI
On Tue, 15 May 2007 08:58, [EMAIL PROTECTED] said:
> Cf. Thompson, K. _Reflections on trusting trust_. Comm. ACM 27, 8
> (Aug. 1984), 761-763.
David Wheeler recently published a paper which explains how to overcome
this problem:
Countering Trusting Trust through Diverse Double-Compiling
h
Hey folks,
I'm wanting to store my OpenPGP key on paper, I suspect this is
something someone else has already done. The motivation behind this is
that paper is the most stable backup medium I have.
I have tried printing out a key, then scanning and using gocr on the result.
That was unsuccessfu
I apologize if I sound terse here, but this conversation has (IMO)
jumped the shark.
> But how can we be confident?
Cf. Thompson, K. _Reflections on trusting trust_. Comm. ACM 27, 8
(Aug. 1984), 761-763.
A digital version of it is currently available at http://www.acm.org/
classics/sep95/,
19 matches
Mail list logo