-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 15 March 2015 at 10:24:29 PM, in
, Jose Castillo
wrote:
> Sorry about the improper threading; I’ve switched off
> digest mode, hopefully this will help.
That one threaded properly. Thanks.
> I may have phrased my point inartfully.
On 15-03-2015 23:24, Jose Castillo wrote:
> but my sense is that more people are vulnerable to passphrase-sniffing
> malware than they are to someone sneaking very close to them with
> an evil device.
However, perhaps even more people are vulnerable to confisquation by
authorities. If they find a
Am 15.03.2015 um 20:50 schrieb Werner Koch:
> On Sun, 15 Mar 2015 16:32, st...@mailbox.org said:
>
>> Now, I'll look for information on how RNG in GnuPG exactly works. It *seems*
>> that haveged should impact on the gathering of entropy (available) at the
>> moment
>> of keypair generation on any
Sorry about the improper threading; I’ve switched off digest mode, hopefully
this will help.
> On Mar 15, 2015, at 9:06 AM, MFPA wrote:
> Pretty much any system *could* be compromised. Should
> we say all bets are off because there is a possibility the
> system might be compromised?
I may have
On Sun, 15 Mar 2015 16:32, st...@mailbox.org said:
> Now, I'll look for information on how RNG in GnuPG exactly works. It *seems*
> that haveged should impact on the gathering of entropy (available) at the
> moment
> of keypair generation on any GNU/Linux PC/laptop equipped with it (specific
You
Am 15.03.2015 um 16:32 schrieb Stephan Beck:
> Am 15.03.2015 um 13:59 schrieb Robert J. Hansen:
>>> Wouldn't the installation of haveged, at least for GNU/linux distros,
>>> extend the possibilities of traditional /dev/(u)random based RNG?
>>
>> No idea -- I haven't looked at haveged. Sorry. :(
Am 15.03.2015 um 13:59 schrieb Robert J. Hansen:
>> Wouldn't the installation of haveged, at least for GNU/linux distros,
>> extend the possibilities of traditional /dev/(u)random based RNG?
>
> No idea -- I haven't looked at haveged. Sorry. :(
Well, I forgot to include relevant information (s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Saturday 14 March 2015 at 9:00:08 PM, in
,
Joey Castillo wrote:
First [OT], I'll point out that your message didn't thread below my
message to which you replied. Your message arrived missing the
"In-Reply-To:" and "References:" headers, whic
> Wouldn't the installation of haveged, at least for GNU/linux distros,
> extend the possibilities of traditional /dev/(u)random based RNG?
No idea -- I haven't looked at haveged. Sorry. :(
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lis
> Thanks for your thoughtful response. I think it's absolutely true
> that different people have different security needs, but I wonder if
> we can't make progress for an average person's use case.
I disagree: I don't believe there is an "average person" or an "average
use case".
But please, don'
Hi.
Am 13-03-2015 21:13, schrieb Joey Castillo:
Hi there,
I'm working on a Kickstarter right now that aims to popularize smart
cards as an easier way for the average user to adopt GnuPG.
https://www.kickstarter.com/projects/joeycastillo/signet-simple-online-privacy-cards
Putting aside any sec
On 03/14/2015 05:13 AM, Joey Castillo wrote:
> Of course smart cards aren't some kind of magic bullet, but if the
> goal is to drive wider adoption of GnuPG and OpenPGP based
> cryptography, I can't shake the feeling that smart cards are a huge
> part of the answer. Thoughts?
I think that smartcar
12 matches
Mail list logo