-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2014-11-21 03:54, Shea Levy wrote:
> Hmm, I’m having a hard time imagining how someone could get me to
> divulge the passphrase if they couldn’t also get me to hand over
> the key backups I own. Of course, my imagination is not the limit
> here,
On Nov 20, 2014 1:58 PM, "Ingo Klöcker" wrote:
>
> On Tuesday 18 November 2014 22:43:18 MFPA wrote:
> KMail encrypts an individual copy for each BCC recipient. I thought
> Thunderbird+Enigmail would also do this.
>
> Any mail client not doing this completely subverts BCC (unless
--throw-keyids
> o
On Tuesday 18 November 2014 22:43:18 MFPA wrote:
> On Tuesday 18 November 2014 at 6:15:57 PM, in
> , Mirimir wrote:
> > As long as messages were separately encrypted to each
> > recipient, no third parties would be involved.
>
> For an email message with multiple recipients, I think most mail
> cl
Gracious reply:
>Install the pkg-config package:
>apt-get install pkg-config
>Shalom-Salam,
>Werner
Thank you!
After installing pkg-config as suggested,
Looks like I'm down to the wire:
checking whether mlock is broken... no
checking for byte typedef... no
checki
Requirement.
Two machines (one Linux, one Windows).
I want a secure file 'shared' between them, as a pwd-safe.
Only I use the two machines, but need the file encrypted.
Any alternatives to symmetrical encryption of a file?
TiA,
--
Dave Pawson
XSLT XSL-FO FAQ.
Docbook FAQ.
http://www.dpawson
I put in a bug report: issue 1769 on http://bugs.g10code.com/gnupg
On Thu, Nov 20, 2014 at 2:11 PM, Werner Koch wrote:
> On Thu, 20 Nov 2014 17:12, br...@minton.name said:
>> ECDSA/EDDSA subkeys. The encryption and signing seems to work, so
>> it's mainly just an informational message:
>
> Actua
On Thu, 20 Nov 2014 17:12, br...@minton.name said:
> ECDSA/EDDSA subkeys. The encryption and signing seems to work, so
> it's mainly just an informational message:
Actually this revealed a real bug: The code to figure out the best
matching hash algorithm for ECDSA was not anymore working. Fixed
A keystroke logger?
Jeremy
On 20 November 2014 16:54, Shea Levy wrote:
> Hmm, I’m having a hard time imagining how someone could get me to divulge
> the passphrase if they couldn’t also get me to hand over the key backups I
> own. Of course, my imagination is not the limit here, so is there so
Hmm, I’m having a hard time imagining how someone could get me to
divulge the passphrase if they couldn’t also get me to hand over the
key backups I own. Of course, my imagination is not the limit here,
so is there something I’m missing?
http://en.wikipedia.org/wiki/Robin_Sage
The people fooled
Il 20/11/2014 18:33, Dave English ha scritto:
> Hint: do you always wear a hood over your head and the keyboard when entering
> your passphrase?
Could simply use different passphrases for regular use and backups...
BYtE,
Diego.
___
Gnupg-users mailin
Hint: do you always wear a hood over your head and the keyboard when entering
your passphrase?
ATB
Dave English
> On 20 Nov 2014, at 16:54, Shea Levy wrote:
>
> Hmm, I’m having a hard time imagining how someone could get me to divulge the
> passphrase if they couldn’t also get me to hand over
Hmm, I’m having a hard time imagining how someone could get me to divulge the
passphrase if they couldn’t also get me to hand over the key backups I own. Of
course, my imagination is not the limit here, so is there something I’m missing?
Thanks,
Shea
> On Nov 20, 2014, at 11:27 AM, Robert J. Ha
oops, I meant to say I have an ECDH and EDDSA subkey, but no ECDSA.
On Thu, Nov 20, 2014 at 11:12 AM, Brian Minton wrote:
> I'm seeing an interesting message when encrypting and signing with my
> ECDSA/EDDSA subkeys. The encryption and signing seems to work, so
> it's mainly just an informationa
I'm seeing an interesting message when encrypting and signing with my
ECDSA/EDDSA subkeys. The encryption and signing seems to work, so
it's mainly just an informational message:
bminton@bminton:~$ echo hi|gpg2 -u 0424DC19B678A1A9 -r 0424DC19B678A1A9 -a -e -s
gpg: ECDSA public key is expected to
My private key is encrypted with a very strong passphrase (10 word
diceware [1], not written down, 129 bits of entropy). Given that, is it
safe to back it up on disks I don't control, such as a private S3 bucket
or a VPS? My intuition says yes, but I've learned to never trust my
intuition when it
Hi all,
My private key is encrypted with a very strong passphrase (10 word diceware
[1], not written down, 129 bits of entropy). Given that, is it safe to back it
up on disks I don't control, such as a private S3 bucket or a VPS? My intuition
says yes, but I've learned to never trust my intuiti
On Thu, 20 Nov 2014 09:40, re...@me.com said:
> checking for pkg-config... no
Install the pkg-config package:
apt-get install pkg-config
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
___
Gnupg-users mai
Hello group,
I'm sorry to keep turning to this group for help with things that may seem
painfully obvious to all of you.
I am attempting to install GnuPG modern 2.1.0 on a clean install of Debian
7.7.0 amd64
I installed the development tools using the Debian "add/remove software"
applicati
18 matches
Mail list logo