On 10.04.17 11:47, Gaston wrote:
> Hi All,
>
> Cloud you tell me how to uninstall it? I can not find any instructions
> in the FAQ.
>
> OS: MacOS 12.2.4
> GnuPG: 2.1.20 (downloaded from
> https://sourceforge.net/p/gpgosx/docu/Download/)
Open a Termina an execute the following line:
sudo rm -rf
Duane:
On Mon, Apr 10, 2017 at 14:28:10 -0300, Duane Whitty wrote:
> Obviously I'm trying to lighten the mood a little and still explore
> what the possibility is, if any, of protecting data from the prying
> eyes of tier 1 actors who might not think that what you have is
> important enough to kil
> I ask this because, I cannot find gpg.conf at all in the normal location...
It's not an error if it doesn't exist. A lot of people get by just fine
without one. But yes, $HOME/.gnupg is the customary location.
If you don't have one, create a new text file in that directory.
_
I ask this because, I cannot find gpg.conf at all in the normal location...
/home/$user/.gnupg being the normal location usually...
anyone know how to fix said problem/where it would be hidden on debian?
Cannot change gpg keys to maximum security unless I know where that is...
___
> I will try phrasing it differently though, is it possible to make the
> ecc keys with sha512 and aes256?
Yes.
Add these two lines to your gpg.conf file:
cert-digest SHA512
default-preference-list AES256 SHA512 SHA256 BZIP2 ZIP ZLIB
Then generate your new ECC certificate.
Hi All,
Cloud you tell me how to uninstall it? I can not find any instructions in
the FAQ.
OS: MacOS 12.2.4
GnuPG: 2.1.20 (downloaded from
https://sourceforge.net/p/gpgosx/docu/Download/)
Thank you,
Gaston
___
Gnupg-users mailing list
Gnupg-users@gnupg
Love gnupg.
Recently discovered it can create X.509 certificates.
However, I’m running into difficulties.
>gpgsm --generate-key --batch cert.gpgsm
gpgsm: line 2: error getting signing key by keygrip '(null)': IPC parameter
error
gpgsm: error creating certificate request: IPC parameter error
>ty
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 17-04-10 12:25 AM, Robert J. Hansen wrote:
>> I think this is being confounded by adjoining two
>> conversations---that smartcards provide additional security given
>> a compromised system, and the satirical quote your provided. I
>> was referr
On Sun, Apr 09, 2017 at 23:25:06 -0400, Robert J. Hansen wrote:
>> My point is that if you base your entire threat model and practices on
>> the fact that some attacker somewhere is going to succeed in a targeted
>> attack against you, then you may as well give up on security period.
>
> If your th
Hello,
This is a retake of a stackexchange.com question, wheree so far noone
chimed in ... http://stackoverflow.com/q/43296285/2103880
I had setup a working smart card setup, where the local key ring solely
contained public subkeys and secret keys resided on a smart card.
Conservatively I set t
I think that we could reach a better mutual understanding when we put the
arguments into context.
Context A: non-technical users, such as Jenny, who encrypt mail with sensitive
content, or sign a message.
Context B: IT-experts with typical use cases of SW-signature or SSH-login.
I think that ma
On 04/10/2017 01:11 AM, Robert J. Hansen wrote:
>> What you *aren't* hearing is:
>
> [good points snipped]
>
> Shirley Gaw's 2006 paper addresses these factors dead-on.
> http://www.soe.ucsc.edu/classes/cmps223/Spring09/Gaw%2006.pdf
>
> It's worth reading. A major additional factor Gaw found in
> What you *aren't* hearing is:
[good points snipped]
Shirley Gaw's 2006 paper addresses these factors dead-on.
http://www.soe.ucsc.edu/classes/cmps223/Spring09/Gaw%2006.pdf
It's worth reading. A major additional factor Gaw found inhibiting
adoption was the fear of being seen as paranoid. The
13 matches
Mail list logo