On 01/30/2014 01:59 AM, NdK wrote:
> Il 30/01/2014 02:14, DUELL, BOB ha scritto:
>
>> I will appreciate any and all comments. If there is a "better way" to do
>> this, I'd love to learn.
> Every user in the group could "leak" the secret key. At least put it
> into a smartcard/token connected to
Il 30/01/2014 02:14, DUELL, BOB ha scritto:
> I will appreciate any and all comments. If there is a "better way" to do
> this, I'd love to learn.
Every user in the group could "leak" the secret key. At least put it
into a smartcard/token connected to the server: they'll just be able to
*use* it.
Hi,
I'm looking for advice and comments about how I have set up a "shared"
environment on our UNIX server for gpg operations. What I have certainly works
but I thought I'd ask for any comments, suggestions, or criticism.
I have gpg version 1.4.14 installed on my server.
I have a large number
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, 30 Jan 2014 00:22:08 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:
> On Tuesday 28 January 2014 at 11:37:25 PM, in
> , Steve Jones wrote:
>
>
> > A more sophisticated approach
> > would be for OpenPGP to include a new signatu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, 30 Jan 2014 00:04:17 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi
>
>
> On Wednesday 29 January 2014 at 7:57:12 PM, in
> , Johannes Zarl wrote:
>
>
> > Under the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Friday 24 January 2014 at 11:08:16 PM, in
, Steve Jones wrote:
> I'd really like an email client
> that automatically signs keys at level 1 (persona) of
> anyone who replies with a signed email that quotes a
> significant portion of the tex
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 28 January 2014 at 11:37:25 PM, in
, Steve Jones wrote:
> A more sophisticated approach
> would be for OpenPGP to include a new signature type
> for this purpose.
There are already more than enough signature types. Wouldn't this le
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 January 2014 at 5:24:36 PM, in
, Steve Jones wrote:
> Well, it could be semi-automatic. I'm only talking
> about persona certifications, which appear to be
> understood as verifying that the key and the email
> address are und
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 January 2014 at 7:57:12 PM, in
, Johannes Zarl wrote:
> Under the assumption
> that an attacker can't reliably do a MITM attack on
> every message that is sent over an extended time
> period
Why would that be assumed? In a cor
Hi nb.linux,
* nb.linux [29. Jan. 2014]:
> Gregor Zattler:
>> * Steve Jones [24. Jan. 2014]:
>>> Which reminds me that I'd really like an email client that
>>> automatically signs keys at level 1 (persona) of anyone who replies
>>> with a signed email that quotes a significant portion of the text
Hello all,
I’ll be attending FOSDEM, and would be very interested in that.
My interest in general is usability of PETs in general, mainly GPG and OTR
enabled IM. I am interested in talking about a redesign of the HKP web
interface presented to users.
From reading the RFC it seems relatively s
On Wednesday 29 January 2014 10:52:26 Robert J. Hansen wrote:
> > Well, it could be semi-automatic. I'm only talking about persona
> > certifications, which appear to be understood as verifying that the key
> > and the email address are under the control of the same person.
>
> I suspect the major
Well, it could be semi-automatic. I'm only talking about persona
certifications, which appear to be understood as verifying that the key
and the email address are under the control of the same person.
I suspect the majority of GnuPG and PGP users could not tell you what
a persona-level verific
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I got curious about the current distribution of keys available on the
keyservers and wrote up a quick tool to dump some of this
information[a] from SKS yesterday. Since this might be of interest for
others as well I'll include some of the findin
On Wed, 29 Jan 2014 11:14:11 +
"nb.linux" wrote:
> Gregor Zattler:
> > Hi Steve, gnupg users,
> > * Steve Jones [24. Jan. 2014]:
> > That's an interesting idea. But there is still the possibility
> > of a man in the middle attac... The web of trust is supposed to
> > counter MITM attacks b
Hello!
The GNU project is pleased to announce the availability of Libgcrypt
version 1.6.1. This is a maintenance release to fix problems found in
the recently released 1.6.0 version.
Libgcrypt is a general purpose library of cryptographic building blocks.
It does not provide any implementation o
Gregor Zattler:
> Hi Steve, gnupg users,
> * Steve Jones [24. Jan. 2014]:
>> Which reminds me that I'd really like an email client that
>> automatically signs keys at level 1 (persona) of anyone who replies
>> with a signed email that quotes a significant portion of the text I
>> sent, as this eff
>> "Werner" == Werner Koch writes:
> (setq mml2015-signer "0x65AD077A")
The correct setting is
(setq mml2015-signers (list "0x65AD077A"))
Just in case
smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnup
Hi Steve, gnupg users,
* Steve Jones [24. Jan. 2014]:
> Which reminds me that I'd really like an email client that
> automatically signs keys at level 1 (persona) of anyone who replies
> with a signed email that quotes a significant portion of the text I
> sent, as this effectively counts as a cha
19 matches
Mail list logo