> Am Di 01.07.2014, 09:29:57 schrieb eMyListsDDg:
>> somehow i managed to send a key id to a key server that has no
>> secret-key. so i would like to remove it.
>> gpg --output keyrevoke.asc --gen-revoke 0x
>> doesn't work since there is no secret key.
>> at a loss as to how to remove/revoke t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 6 July 2014 at 10:18:20 PM, in
,
Matthias Fischer wrote:
> I can achieve something similar, by using:
> $ gpg --no-default-keyring --keyring /tmp/keyring.once
> --import
> $ gpg --no-default-keyring --keyring /tmp/keyring.once
> --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 6 July 2014 at 3:25:57 PM, in
, Johan Wevers wrote:
> Since I don't know when I will consider a key
> compromised or weak, I don't work with expiry dates but
> revoke the key in such a case.
I don't know quite what /The Fuzzy Whirl
Am So 06.07.2014, 23:18:20 schrieb Matthias Fischer:
> I can achieve something similar, by using:
> $ gpg --no-default-keyring --keyring /tmp/keyring.once --import
> $ gpg --no-default-keyring --keyring /tmp/keyring.once
> --trust-model always --recipient -e
>
> But this requires an additional
Hi folks,
I already asked the question here about half a year ago, but IIRC didn't get
any reaction:
Imagine you have a file containing one or more PGP-Public-Keys, and you want to
encrypt something for this key, without adding the key to your public keyring.
Is there some commandline option to
Il 04/07/2014 05:54, Robert J. Hansen ha scritto:
> If someone asks you for your certificate, you don't have to
> trade a SHA-1 fingerprint -- just put down your keychain and let the
> person wave a cell phone over it.
Just place in the tag the URL where to retrieve your key.
> Obviously there ar
On 7/6/2014 3:36 AM, The Fuzzy Whirlpool Thunderstorm wrote:
> Using GPG encryption is still good, although it's vulnerable to
> quantum cryptodecryption.
In point of fact, we don't know this.
Theoretically, science-fiction level breakthroughs in quantum
computation would break RSA. But the prob
On 06-07-2014 9:36, The Fuzzy Whirlpool Thunderstorm wrote:
> Using GPG encryption is still good, although it's vulnerable to quantum
> cryptodecryption.
> It's a good idea to set an expiration for each of your GPG key.
> So that, when the expiration time comes, you'll be able to generate a
> new
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 6 July 2014 at 8:36:05 AM, in
, The Fuzzy Whirlpool
Thunderstorm wrote:
> Using GPG encryption is still good, although it's
> vulnerable to quantum cryptodecryption. It's a good
> idea to set an expiration for each of your GPG key. S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Friday 4 July 2014 at 6:24:53 AM, in
, Robert J. Hansen wrote:
> NFC is significantly more convenient than
> fumbling with your phone's camera app, taking a
> snapshot, etc. Wave it and it's done. NFC has some
> interesting human interface
Using GPG encryption is still good, although it's vulnerable to quantum
cryptodecryption.
It's a good idea to set an expiration for each of your GPG key.
So that, when the expiration time comes, you'll be able to generate a
new GPG key to address a possibility of your old keys being cracked.
GPG i
It seems that APG and OpenKeychain on Android supports GPG key exchange
via NFC just like BBM pin exchange via QRcode.
pgp8ZNOhdJvvE.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinf
12 matches
Mail list logo