Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Robert J. Hansen
Faramir wrote: > Ok... but I think I would use this at my university, and there the > computers are safe enough... They are probably not. I would strongly recommend talking to your local IT support group and finding out firsthand how much of a malware problem they've had with publicly accessible

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 [EMAIL PROTECTED] wrote: > Robert J. Hansen rjh at sixdemonbag.org > wrote on Fri May 9 19:56:51 CEST 2008 : > >> The interrogator decides to keep on beating you until you decide >> to turn over the (nonexistent) hidden volume. > >> there are time

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Chris De Young
Depends on where you are and what you're doing. [...] Moral of the story: there are times when you very much want to prove that you _don't_ have certain data. TrueCrypt's design makes these sorts of proofs impossible. Well, it actually gives you the choice -- as I recall the hidden volume

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Robert J. Hansen
[EMAIL PROTECTED] wrote: > (b) erase the hidden volume from the truecrypt container > (Peter Guttmann 35 pass, should work fine, considering the next few > steps) Have you even read Gutmann's paper? Gutmann's paper is meant for wiping data from physical drives, not software drives. The 35-pass

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread vedaal
Robert J. Hansen rjh at sixdemonbag.org wrote on Fri May 9 19:56:51 CEST 2008 : > The interrogator decides to keep on beating you until you decide >to turn over the (nonexistent) hidden volume. >there are times when you very much want to prove >that you _don't_ have certain data. >TrueCrypt's

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Robert J. Hansen
Arnaud Ongenae wrote: > I just discover Truecrypt and there is a very interesting feature, the > hidden volume (http://www.truecrypt.org/hiddenvolume.php) it could be > good to use it for this case. Depends on where you are and what you're doing. I am not a fan of TrueCrypt's hidden volume featur

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Robert J. Hansen escribió: > Faramir wrote: >> OMG... 8 highly complex steps... surely that will defeat any attempt >> to seize my private key... > > Not really. > > Imagine a piece of malware that looks for new drives to be mounted. As > soon as i

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Robert J. Hansen
Faramir wrote: > OMG... 8 highly complex steps... surely that will defeat any attempt > to seize my private key... Not really. Imagine a piece of malware that looks for new drives to be mounted. As soon as it gets mounted, the malware looks through the drive looking for interesting data. Malwa

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] escribió: > Faramir faramir.cl at gmail.com > wrote on Fri May 9 14:21:41 CEST 2008 : > >> I am going to carry gpg in my USB flash drive, > ... I will be carrying my private key with me > ... I'd like to know the suggested way to

Re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread Arnaud Ongenae
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I just discover Truecrypt and there is a very interesting feature, the hidden volume (http://www.truecrypt.org/hiddenvolume.php) it could be good to use it for this case. unfortunately, it should be created on a win machine :'(, moreover I don't know i

Re: Can't sign & encrypt from command line

2008-05-09 Thread Andy McKnight
> > > I'm running gpg 1.4.9 on Vista. When working with files from the command > line I can encrypt or sign but I can't do both. > Guys, scratch this question. It doesn't verify if I only run a verification using the --verify command but it does verify it I decrypt the file. Andy. _

re: Protecting private key on USB flash drive: how to?

2008-05-09 Thread vedaal
Faramir faramir.cl at gmail.com wrote on Fri May 9 14:21:41 CEST 2008 : >I am going to carry gpg in my USB flash drive, ... I will be carrying my private key with me ... I'd like to know the suggested way to keep the key safe. many people have different opinions on this, fwiw, here is what i

Can't sign & encrypt from command line

2008-05-09 Thread Andy McKnight
Hi, I'm running gpg 1.4.9 on Vista. When working with files from the command line I can encrypt or sign but I can't do both. The results I get as are as follows: gpg -a -s -e file.txt Encrypts the file only. I cannot verify a signature on this file, I get the following message. gpg: no valid O

Protecting private key on USB flash drive: how to?

2008-05-09 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Well, I am going to carry gpg in my USB flash drive, either using portable firefox+FireGPG+some way to put gpg on the drive, or portable thunderbird+gpg for portable TB+enigmail. But despite what way I will use, I will be carrying my private key with m

Re: Hash algo for Gnupg

2008-05-09 Thread Vlad "SATtva" Miller
Funaki, Yasuhiro (07.05.2008 10:31): > Dear expert, > > I understand as below when hash is used at decrypting operation. >> Hash algo is used to generate a key to decrypt a private key from > passphrase at decrypting operation. > When above my understanding is correct, > could you advice me how to

Re: How to decrypt multiple blocks of encrypt messages in one csv file gnupg

2008-05-09 Thread Vlad "SATtva" Miller
Chilupuri, Vishwarupachary (Chary) (AU - Sydney) (08.05.2008 12:08): > Hi , > I got a situation like below: > Web form with name,address,creditcard details so on. so i'm encrypting > using the public key,and storing it in the database. > Later i'm exporting the results from the database to the Exce

Hash algo for Gnupg

2008-05-09 Thread Funaki, Yasuhiro
Dear expert, I understand as below when hash is used at decrypting operation. >Hash algo is used to generate a key to decrypt a private key from passphrase at decrypting operation. When above my understanding is correct, could you advice me how to specify the hash algo at generating key pair and h

How to decrypt multiple blocks of encrypt messages in one csv file gnupg

2008-05-09 Thread Chilupuri, Vishwarupachary (Chary) (AU - Sydney)
Hi , I got a situation like below: Web form with name,address,creditcard details so on. so i'm encrypting using the public key,and storing it in the database. Later i'm exporting the results from the database to the Excel file.(ex:donation.csv which includes all the encripted blocks of data ) -