-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Monday 28 April 2014 at 5:49:30 PM, in
,
John Wofford wrote:
> I apologize if this has been discussed before,
I have taken part in such discussions before. A quick search suggests
to look in the list archives for around July 2010, Feb/Marc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Monday 28 April 2014 at 8:47:50 PM, in
, Doug Barton wrote:
> My point was simply that signatures don't "activate"
> keys.
I guess "activate" is a bit too close for comfort to "enable," which
doesn't involve signatures.
> One of the or
On 28/04/14 15:07, MFPA wrote:
> Such as? Without signatures or "trust-model always" my email app
> throws an error message and will not encrypt to that key, or even
> display a message signed by it.
I was wondering the same thing, but I can think of two more ways:
- trust-model direct (and then
On 04/28/2014 12:22 PM, Peter Lebbing wrote:
On 28/04/14 15:07, MFPA wrote:
Such as? Without signatures or "trust-model always" my email app
throws an error message and will not encrypt to that key, or even
display a message signed by it.
I was wondering the same thing, but I can think of two
The fact that you can't use the plain text and the cipher text to recover the
private key is simply AMAZING. You really should mention that fact in the faq.
>> Is it polite to post saying that you want to sign keys with somebody
>> on a random mailing list?
>
> Depends a lot on the mailing list.
Am Mo 28.04.2014, 16:49:30 schrieb John Wofford:
> I apologize if this has been discussed before,
Yeah, I was the last one.
> sense to run email addresses through a one-way hash before uploading
> them to a keyserver?
Short answer: It would not work with typical email addresses because
their "
I apologize if this has been discussed before, but wouldn't it make
sense to run email addresses through a one-way hash before uploading
them to a keyserver? It seems trivial for spammers to scrape all
uploaded keys for addresses at this point in time.
For example, I upload key associated with add
On 04/26/2014 06:21 PM, John Sockwell wrote:
> I’m looking for best practices in creating and managing multiple subkeys and
> uids.
>
> In my scenario, I have a personal computer and personal email address. In
> addition, I have an employer provided computer and employer email address.
>
> I’d
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Monday 28 April 2014 at 4:10:31 PM, in
, Mike Cardwell wrote:
> Many companies also make you wear a suit and tie and
> use Internet Explorer 7. I do not work for these
> companies.
Fair enough. I was just pointing out to the OP that the s
* on the Mon, Apr 28, 2014 at 02:40:29PM +0100, MFPA wrote:
>> I solve this problem using an OpenPGP smart card. My
>> PGP key never touches my work machine, so I never have
>> to worry about it being compromised.
>
> Many employers would not allow you to plug in hardware, so you
> couldn't use a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 27 April 2014 at 3:02:11 AM, in
, Robert J. Hansen wrote:
> Is anyone else getting spam like this the instant they
> post to the list?
Last week, in response to one of my postings to GnuPG-Users, I got a
series of five such message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 27 April 2014 at 11:11:00 AM, in
, Mike Cardwell wrote:
> I solve this problem using an OpenPGP smart card. My
> PGP key never touches my work machine, so I never have
> to worry about it being compromised.
Many employers would not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Saturday 26 April 2014 at 11:01:15 PM, in
, Gabriel Niebler wrote:
> I trust, though, that such mixed-case certifcates will
> be found very rarely in people's public keyrings
Why? If people re-upload their keys to servers to publish additi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Saturday 26 April 2014 at 6:14:07 PM, in
, Doug Barton wrote:
> But there are other mechanisms besides signatures that
> will allow you to use the key,
Such as? Without signatures or "trust-model always" my email app
throws an error messag
14 matches
Mail list logo