Faramir wrote:
> Ok... but I think I would use this at my university, and there the
> computers are safe enough...
They are probably not. I would strongly recommend talking to your local
IT support group and finding out firsthand how much of a malware problem
they've had with publicly accessible
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
[EMAIL PROTECTED] wrote:
> Robert J. Hansen rjh at sixdemonbag.org
> wrote on Fri May 9 19:56:51 CEST 2008 :
>
>> The interrogator decides to keep on beating you until you decide
>> to turn over the (nonexistent) hidden volume.
>
>> there are time
Depends on where you are and what you're doing.
[...]
Moral of the story: there are times when you very much want to prove
that you _don't_ have certain data. TrueCrypt's design makes these
sorts of proofs impossible.
Well, it actually gives you the choice -- as I recall the hidden volume
[EMAIL PROTECTED] wrote:
> (b) erase the hidden volume from the truecrypt container
> (Peter Guttmann 35 pass, should work fine, considering the next few
> steps)
Have you even read Gutmann's paper?
Gutmann's paper is meant for wiping data from physical drives, not
software drives. The 35-pass
Robert J. Hansen rjh at sixdemonbag.org
wrote on Fri May 9 19:56:51 CEST 2008 :
> The interrogator decides to keep on beating you until you decide
>to turn over the (nonexistent) hidden volume.
>there are times when you very much want to prove
>that you _don't_ have certain data.
>TrueCrypt's
Arnaud Ongenae wrote:
> I just discover Truecrypt and there is a very interesting feature, the
> hidden volume (http://www.truecrypt.org/hiddenvolume.php) it could be
> good to use it for this case.
Depends on where you are and what you're doing.
I am not a fan of TrueCrypt's hidden volume featur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen escribió:
> Faramir wrote:
>> OMG... 8 highly complex steps... surely that will defeat any attempt
>> to seize my private key...
>
> Not really.
>
> Imagine a piece of malware that looks for new drives to be mounted. As
> soon as i
Faramir wrote:
> OMG... 8 highly complex steps... surely that will defeat any attempt
> to seize my private key...
Not really.
Imagine a piece of malware that looks for new drives to be mounted. As
soon as it gets mounted, the malware looks through the drive looking for
interesting data. Malwa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED] escribió:
> Faramir faramir.cl at gmail.com
> wrote on Fri May 9 14:21:41 CEST 2008 :
>
>> I am going to carry gpg in my USB flash drive,
> ... I will be carrying my private key with me
> ... I'd like to know the suggested way to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I just discover Truecrypt and there is a very interesting feature, the
hidden volume (http://www.truecrypt.org/hiddenvolume.php) it could be
good to use it for this case.
unfortunately, it should be created on a win machine :'(, moreover I
don't know i
>
>
> I'm running gpg 1.4.9 on Vista. When working with files from the command
> line I can encrypt or sign but I can't do both.
>
Guys, scratch this question. It doesn't verify if I only run a verification
using the --verify command but it does verify it I decrypt the file.
Andy.
_
Faramir faramir.cl at gmail.com
wrote on Fri May 9 14:21:41 CEST 2008 :
>I am going to carry gpg in my USB flash drive,
... I will be carrying my private key with me
... I'd like to know the suggested way to keep the key safe.
many people have different opinions on this,
fwiw,
here is what i
Hi,
I'm running gpg 1.4.9 on Vista. When working with files from the command
line I can encrypt or sign but I can't do both. The results I get as are as
follows:
gpg -a -s -e file.txt
Encrypts the file only. I cannot verify a signature on this file, I get the
following message.
gpg: no valid O
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well, I am going to carry gpg in my USB flash drive, either using
portable firefox+FireGPG+some way to put gpg on the drive, or portable
thunderbird+gpg for portable TB+enigmail. But despite what way I will
use, I will be carrying my private key with m
Funaki, Yasuhiro (07.05.2008 10:31):
> Dear expert,
>
> I understand as below when hash is used at decrypting operation.
>> Hash algo is used to generate a key to decrypt a private key from
> passphrase at decrypting operation.
> When above my understanding is correct,
> could you advice me how to
Chilupuri, Vishwarupachary (Chary) (AU - Sydney) (08.05.2008 12:08):
> Hi ,
> I got a situation like below:
> Web form with name,address,creditcard details so on. so i'm encrypting
> using the public key,and storing it in the database.
> Later i'm exporting the results from the database to the Exce
Dear expert,
I understand as below when hash is used at decrypting operation.
>Hash algo is used to generate a key to decrypt a private key from
passphrase at decrypting operation.
When above my understanding is correct,
could you advice me how to specify the hash algo at generating key pair
and h
Hi ,
I got a situation like below:
Web form with name,address,creditcard details so on. so i'm encrypting
using the public key,and storing it in the database.
Later i'm exporting the results from the database to the Excel
file.(ex:donation.csv which includes all the encripted blocks of data )
-
18 matches
Mail list logo