Re: Linux crypto killer apllication

2008-05-15 Thread Brian Smith
Robert J. Hansen wrote: Brian Smith wrote: It is reasonable to choose to protect a secret for the rest of one's life (~100 years). You're committing two logical fallacies here: the first is you're begging the question, and the second is the assumption of facts not in evidence.

Re: Linux crypto killer apllication

2008-05-15 Thread Brian Smith
Robert J. Hansen wrote: Brian Smith wrote: It is reasonable to choose to protect a secret for the rest of one's life (~100 years). You're committing two logical fallacies here: the first is you're begging the question, and the second is the assumption of facts not in evidence.

Re: Linux crypto killer apllication

2008-05-15 Thread Brian Smith
David Picón Álvarez wrote: From: "Robert J. Hansen" <[EMAIL PROTECTED]> I see no reason to add "features" to GnuPG that have no connection to any real-world need. Changing the largest keysize, even in expert mode, has no connection to any real-world need I've ever heard anyone articulate, and s

RE: Signing people with only one form of ID?

2008-02-29 Thread Brian Smith
Richard Hartmann wrote: > > I don't see how a keysigning party works. Anybody that > > participates by showing ID is reducing their personal > > privacy by divulging their personal information. > > The basic assumption is that a key signing is good and that > you actually gain something from it

RE: Signing people with only one form of ID?

2008-02-27 Thread Brian Smith
Robert J. Hansen wrote: > Because of these three factors--no semantic meaning > associated with certification levels, some OpenPGP > implementations not supporting the distinctions, and many > implementations making it easy to forget that such > distinctions exist--my default policy is to treat

RE: Printing Keys and using OCR (was: Proofreadable base64)

2007-09-21 Thread Brian Smith
Peter Palfrader wrote: > Nice idea. When trying to find decent backup methods for my > new Tor identity key I cam accross this thread. > > I played all day with ocr and friends. In the course I wrote > a small script that does what you suggest. I tried to keep > it small enough to print it a

RE: [Announce] GnuPG 2.0.5 released

2007-07-06 Thread Brian Smith
Werner Koch wrote: > * Switched license to GPLv3. Why was the license switched to GPLv3? And, who made this decision? Thanks, Brian ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

RE: RSA useless for encryption was: RE: RSA 1024 ridiculous

2007-06-20 Thread Brian Smith
Snoken wrote: > I checked with the source: > http://www.rsa.com/rsalabs/node.asp?id=2004 > > In 2003 users of RSA 1024-bit keys were advised to drop them > before 2010. Now the situation is somewhat worse than it > looked in 2003. That is not what the RSA website says. The website says, more-or

RE: RSA 4096 ridiculous?

2007-06-20 Thread Brian Smith
Werner Koch wrote: > > It took me infinitely longer to type the pass-phrase for the signing > > than it took to actually create the sigs which seemed to be almost > > instantaneous. Timing the signing is sort of ridiculous > > That is true for your desktop box. However, for small > devices

RE: RSA 1024 ridiculous

2007-06-16 Thread Brian Smith
Snoken wrote: > I suppose this means that 1024 bit RSA-keys are ridiculous > and the Open PGP Card is a joke. And what about all web sites > protected by SSL with a 1024-bit RSA-certificate? This seems to be more-or-less on schedule: http://en.wikipedia.org/wiki/Key_size#Asymmetric_algorithm_key