Hi,
> S/MIME itself is not used outside of email apps, however the certificates
> (keys), sometimes referred to as X.509 certificates, S/MIME uses are able
> to be used by other apps, eg for digital signatures in applications such as
> Open Office,
OpenOffice uses XML-DSig, not S/Mime.
> and A
[EMAIL PROTECTED] wrote:
> I am not a encryption expert, and need some help from the GnuPG user group.
>
> We have a new software product that has the capability of encrypting
> documents using SMIME. How common is SMIME and used outside of email
> clients? Is it compatible with the OpenPGP stan
On Wed, Feb 06, 2008 at 03:28:49PM -0600, [EMAIL PROTECTED] wrote:
> I am not a encryption expert, and need some help from the GnuPG user group.
That's why we are here.
> We have a new software product that has the capability of encrypting
> documents using SMIME. How common is SMIME and used o
[EMAIL PROTECTED] wrote:
I am not a encryption expert, and need some help from the GnuPG user
group.
While you can probably get some good pointers here, if you're looking
for an answer you can rely on you will either need to do a fair bit of
homework or else contract with an outside information
I am not a encryption expert, and need some help from the GnuPG user group.
We have a new software product that has the capability of encrypting
documents using SMIME. How common is SMIME and used outside of email
clients? Is it compatible with the OpenPGP standard, and thus GnuPG? Is
there a
I have a file that I encrypted for myself
and I want to read some information from it.
The file is a text file and I need to read several lines of it.
The following requirements must be met:
I was going to suggest
gpg --decrypt file.gpg | grep "interesting stuff" | banner | less >/dev/null
I have a file that I encrypted for myself and I want to read some information
from it. The file is a text file and I need to read several lines of it.
The following requirements must be met:
I was going to suggest
gpg --decrypt file.gpg | grep "interesting stuff" | banner | less >/dev/null
Hi,
> 1.
> The decrypted information must not make it to any persistent medium
> (I understand gpg '-d' already guarantees it
> as long as it manages the decrypted text,
> but what happens after it leaves gpg?)
Use a full-disc encryption system for all your persistent media.
> 2.
> The decrypte