On Monday 16 February 2009, Werner Koch wrote:
> On Mon, 16 Feb 2009 18:48, faramir...@gmail.com said:
> >> The "signatures not checked" seems pretty self explanatory. What
> >> does the bad signatures mean?
>
> The signed data does not match the signature. That is the signed
> data or the signat
Hi!
My boss just asked me to make up some ideas about implementations of
X.509 and OpenPGP - which should be introduced in our company later then.
I'm just hacking together a presentation and I'm looking for ideas.
Have you seen a comparison of several implementations for different MUAs
yet?
An
On Mon, 16 Feb 2009 18:48, faramir...@gmail.com said:
>> The "signatures not checked" seems pretty self explanatory. What does
>> the bad signatures mean?
The signed data does not match the signature. That is the signed data
or the signature has been modified or the signature was not correctly
On Mon, Feb 16, 2009 at 02:48:11PM -0300, Faramir wrote:
> paramouse escribi??:
> > I am new to using GnuPG and hoping this is the the correct place to post
> > questions.
> >
> > For practice, I imported some public keys to my keyring. I ran a
> >
> > gpg --check-sig
> >
> > After listing the
On Mon, Feb 16, 2009 at 12:10:32PM +0100, Jonas Islander wrote:
> When you suspect your private key may be compromised, it's obvious
> that you should revoke the key pair, upload your revocation to the key
> servers, and generate a new pair. But what is "best practice" for
> telling people about yo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
paramouse escribió:
> I am new to using GnuPG and hoping this is the the correct place to post
> questions.
>
> For practice, I imported some public keys to my keyring. I ran a
>
> gpg --check-sig
>
> After listing the signatures of the public ke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
If I recall correctly, when generating the revocation
certificate, you have an option to choose why the certificate is
being generated, and one choice is "key compromised".
- --Avi
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32) - GPGs
On Mon, 16 Feb 2009 13:22, ramon.loure...@upf.edu said:
> if (! -p STDIN) {
> close(STDIN);
> open(STDIN, "gpg --list-sigs |");
Do not use this command for scripts. It may break with the next gpg
version. Always use the --with-colons option.
Shalom-Salam,
Werner
--
Die Gedanken
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Andre Amorim wrote:
> Hello List,
> I've been playing with sig2dot to draw graph from the keys stored in
> my own keyring but,
>
> How can I do a graph from diferents key sign parties?
Hi Andre!
Do you know sims?
http://tokkee.org/sims/
You can
On Mon, 2009-02-16 at 09:19 +0100, Werner Koch wrote:
> They will use a hardware logger and don't care about any encrypted
> stuff
> in your pocket.
Of course this is possible,.. but perhaps only for someone more
powerful. (NSA could perhaps even replace your CPU with one that has an
additional OS
When you suspect your private key may be compromised, it's obvious
that you should revoke the key pair, upload your revocation to the key
servers, and generate a new pair. But what is "best practice" for
telling people about your new public key - transferring your identity
to it, so to speak?
Is t
Hi,
I am working on decryting a pgp file using GnuPG.I want to do the same in a
.NET C# Console Application.I want to send the passPhrase from the
application itself,& don't want it to prompt.
I tried to passing the Passphrase from the application but its not working.
Finally,I want to decrypt th
On Fri, 13 Feb 2009 19:30, em...@sven-radde.de said:
> "They" will have difficulties installing a keylogger if the unencrypted
> /boot is always in your pocket and the HDD contains just encrypted
> gibberish.
They will use a hardware logger and don't care about any encrypted stuff
in your pocket.
13 matches
Mail list logo