On 28/08/12 21:54, Richi Lists wrote:
> Will this also write also to the smart-card or are the changes only in
> the local keyring?
UIDs are not stored on the smartcard, so it does not matter.
> I'm a bit hesitant because the full disk encryption on my netbook works
> also with the same key, and
I meant to say IPADs not IPODSProcopius
Sent using Hushmail
On August 28, 2012 at 4:52 PM, mercuryris...@hush.ai wrote:Thank you
both for replying to my question about IPODs and Androids. It sounds
like neither will work to be fully functional with gnupg or pgp then.
Perhaps I should get a small
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/28/2012 08:01 PM, MFPA wrote:
> Hi
>
>
> On Saturday 25 August 2012 at 2:59:57 AM, in
> , Faramir wrote:
>
>
>>IMHO, the main trouble probably is people don't feel
>> the need to protect their privacy.
>
> So why do they use envelopes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 26 August 2012 at 8:30:57 AM, in
, peter.segm...@wronghead.com wrote:
> pushing the
> boundary of what is and what isn't "constitutional and
> democratic" (and it is a very soft boundary, depending
> perhaps only on the depth of one'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 August 2012 at 12:00:34 AM, in
, No such Client wrote:
> On PKI, I fear that the property of it being so
> decentralized, and relatively free, is the same reason
> why it does not have wider adoption. It is not a
> centralized
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Saturday 25 August 2012 at 2:59:57 AM, in
, Faramir wrote:
>IMHO, the main trouble probably is people don't feel
> the need to protect their privacy.
So why do they use envelopes rather than postcards, and keep secret
the PIN for their
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 28 August 2012 at 4:06:41 PM, in
, No such Client wrote:
> Granted. However if I used a real name instead of a
> pseudonym, would that make people ¨feel¨ better?
If you had picked a pseudonym that looked like a real name, nobody
wo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APG functions on android remarkably well, with key servers and key
generation features. The only thing missing that comes to mind is the
WOT side. As long as this is between friends, that becomes relatively
unnecessary. Also possible is to just impor
For lack of time, I have to be brief; I just answer the most important
points.
"Mark H. Wood" wrote:
> I use encryption to enforce the privacy I already (should) have.
I answered this in my post to Faramir, several minutes ago.
> So, yes, it's a weapon.
I call it a weapon, because it does
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Thank you both for replying to my question about IPODs and Androids. It sounds
like neither will work to be fully functional with gnupg or pgp then. Perhaps
I should get a small laptop computer. I wonder if one of those small driveless
computers
On PKI,
I fear that the property of it being so decentralized, and relatively
free, is the same reason why it does not have wider adoption. It is not
a centralized product, nor is trust maintained by any government /
private institutions (banks, clerks, notaries, etc ) to prove identity.
So, thus..
An addendum, is the component that is neccesary for 4gw.
Netwar
http://en.wikipedia.org/wiki/Netwar
signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-
For the lack of time, I'll be very brief. I plan to answer Robert
Hansen's post, but I yet need to find a couple of free hours for that.
Faramir wrote:
> What would happen if you start reading your daughter's diary
> everyday, but never let anybody catch you reading it? And you are
> careful
Will this also write also to the smart-card or are the changes only in
the local keyring?
I'm a bit hesitant because the full disk encryption on my netbook works
also with the same key, and I don't want to reinstall the whole thing.
Rgds
Richard
On Di, 2012-08-28 at 10:49 +0200, Peter Lebbing wro
Hi Werner,
the ! exclamation mark did the trick!
I tried specifying the subkey I wanted before, but only the exclamation
mark makes it work.
With the exclamation mark, also signing in evolution works again.
Is this documented somewhere?
Thanks a lot.
Richard
On Di, 2012-08-28 at 10:47 +0200, W
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I haven't responded to any of No Such Client's emails yet, on account of
them not being constructive. This email is constructive, though, so
here goes.
> With due respect Mr Lebbing, my initial post - was in response to
> Mr. Hansen´s post which
On Sun, Aug 26, 2012 at 11:37:01PM +0200, Stan Tobias wrote:
[snip]
> What I mean to say above, is that weapons are anti-social, they don't
> build trust; and there are better means, other than guns, to maintain
> peace. Encryption is a weapon. I believe there are many valid reasons
> to use it,
On 08/28/2012 04:56 PM, Heinz Diehl wrote:
> On 28.08.2012, No such Client wrote:
>
>
>> I simply chose to keep my name private. Surely, on a public, crypto
>> mailing-list, with all sorts of interesting people, the idea of
>> privacy
>> would be understood no? real names or pseudonyms should
On 08/28/2012 03:55 PM, Peter Lebbing wrote:
> On 28/08/12 15:44, No such Client wrote:
>
>> Surely, on a public, crypto mailing-list, with all sorts of interesting
>> people, the idea of privacy would be understood no? real names or pseudonyms
>> should be quite irrelevant.. Is it not the con
On 08/28/2012 04:01 PM, Hubert Kario wrote:
> On Tuesday 28 of August 2012 15:44:53 No such Client wrote:
>
>> Is it not the content that counts?
>>
> Yes, but if the content is controversive and with debatable argumentation
> then
> only your credentials remain -- the recognition of your
On Tuesday 28 of August 2012 15:44:53 No such Client wrote:
> Is it not the content that counts?
Yes, but if the content is controversive and with debatable argumentation then
only your credentials remain -- the recognition of your name. Which you have
none at the moment.
Don't take it personal
On 28.08.2012, No such Client wrote:
> I simply chose to keep my name private. Surely, on a public, crypto
> mailing-list, with all sorts of interesting people, the idea of
> privacy
> would be understood no? real names or pseudonyms should be quite
> irrelevant.. Is it not the content that coun
On 08/28/2012 03:48 PM, Peter Lebbing wrote:
> On 28/08/12 15:37, No such Client wrote:
>
>> smut? You imply that I speak in a perverse or sexual manner? Hardly.
>>
> I didn't want to actually quote the insulting stuff, but let me quote
> nonetheless:
>
>
>> your own bed, and the chance
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
28.08.2012 07:48, mercuryris...@hush.ai kirjoitti:
> Can IPAD or ANDROID TABLETS create gnupgp private/public keys and
> use gnupg or is that still relegated to Windows/Vista, Mac OSX and
> Linux on desktop and laptop/notebook computer platforms?
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
27.08.2012 23:59, Richard Ulrich kirjoitti:
> When I generated my new private key, I used one of my email
> addresses. This email address is stored both on the crypto stick
> (smart card) and in the secring.gpg or pubring.gpg, probably both.
>
On 28/08/12 15:44, No such Client wrote:
> Surely, on a public, crypto mailing-list, with all sorts of interesting
> people, the idea of privacy would be understood no? real names or pseudonyms
> should be quite irrelevant.. Is it not the content that counts?
Yes, it indeed is the content that c
On 28/08/12 15:37, No such Client wrote:
> smut? You imply that I speak in a perverse or sexual manner? Hardly.
I didn't want to actually quote the insulting stuff, but let me quote
nonetheless:
> your own bed, and the chance to make many new friends
(note that this is easily read, and probably
On 08/28/2012 02:31 PM, Hubert Kario wrote:
>
> The fact that you've just showed up on The list makes this e-mail and
> pseudonym disposable, not the fact you're using a pseudonym or gmail.
>
> Besides, gmail is very much disposable. It's not like you have to provide
> your
> name, surname and I
On 08/28/2012 10:28 AM, Peter Lebbing wrote:
> On 28/08/12 08:57, No such Client wrote:
>
>> # A good Daddy is discreet. :-)
>>
> (Etcetera...)
>
> Please take your smut elsewhere. I'm sure you know people who will laugh; tell
> it to them. Not here.
>
> Peter.
>
>
smut? You imply that I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 28/08/12 05:48, mercuryris...@hush.ai wrote:
> Can IPAD or ANDROID TABLETS create gnupgp private/public keys and
> use gnupg or is that still relegated to Windows/Vista, Mac OSX and
> Linux on desktop and laptop/notebook computer platforms?
I us
On Tuesday 28 of August 2012 01:44:54 No such Client wrote:
> Sir Hansen:
> Well, pseudonyms do not make my words less valid. I am not one of the
> gpg-using advocates, who has to be open, and forthcoming with all to
> make a point. A pseudonym is well within my rights. You simply don´t
> need to
On 28/08/12 08:37, peter.segm...@wronghead.com wrote:
> break: RNG, asymmetric and symmetric cipher, while the symmetric
> has only one: symmetric cipher.
When using OpenPGP, add RNG back to the list: the passphrase is only used to
encrypt the randomly generated session key that encrypts the data.
On 28/08/12 01:54, No such Client - nosuchcli...@gmail.com wrote:
If you are restricting heavily the people you share your public key with,
why not simply use a symmetric algorithm, forgetting public key
cryptography completely?
> Uhh. because the benefit of pubkey encryption is still there, mi
On Tue, 28 Aug 2012 12:29, d.w.chadw...@kent.ac.uk said:
> e.g. by having two MS code signing keys, one owned by MS the other by
> the NSA.
Or more realistic, one issued by the government of Freedonia or Sylvania
(insert your favorite country here - enough of them are accepted as root
CAs).
Sal
That tool is encryption, and it doesn't only enforce our
privacy right, it also make us aware about people trying to take away
that right from us, because the one trying to take away that right,
first would have to take away our right to use encryption, or force us
to install some backdoor on
On Mon, 27 Aug 2012 22:57, ricu...@gmail.com said:
> #gpg --sign setup_my_system.sh
> gpg: sending command `SCD PKSIGN' to agent failed: ec=6.18
The error is:
$ gpg-error 6.18
100663314 = (6, 18) = [...] = (SCD, Wrong secret key used)
The scdaemon would have printed this to its log file:
On 28/08/12 10:37, Werner Koch wrote:
> gpg --edit-key YOURKEYID
>
> addkey
>
> # Now follow the prompts
Surely, Werner meant "adduid" which adds a new e-mail address, and not "addkey"
which adds a new subkey.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmai
On Mon, 27 Aug 2012 23:57, pa...@cs.hmc.edu said:
> You can add or delete the names and emails associated with a key using
> gpg --edit-key and the adduid and deluid commands, respectively.
You may use "deluid" only if you never published your public key. The
better choice is "revuid". Thus if
Hi,
please take some time to quote messages in a way which allows to read
them quickly. Your current style is very hard to parse. In particular:
- Strip quotes to a few lines. Quoteshall only provide context but not
repeat everything.
- Put an empty lines before your reply.
- Put an empt
Sorry, forgot to change the subject line. Running digestive mode for a
bit here.
BR
Sin T.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 28/08/12 08:57, No such Client wrote:
> # A good Daddy is discreet. :-)
(Etcetera...)
Please take your smut elsewhere. I'm sure you know people who will laugh; tell
it to them. Not here.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted ma
On 2012-08-28 08:52, gnupg-users-requ...@gnupg.org wrote:
> Message: 3
> Date: Mon, 27 Aug 2012 21:48:54 -0700
> From: mercuryris...@hush.ai
> To: gnupg-users@gnupg.org
> Subject: Can IPAD or Android Tablets create Keys and use gnupg
> Message-ID: <20120828044854.d505010e...@smtp.hushmail.com>
> C
42 matches
Mail list logo