u wot m8
http://knowyourmeme.com/memes/u-wot-m8
Nice tool; thanks for sharing!
Cheers,
Fraser
On Wed, Feb 21, 2018 at 09:59:01AM -0500, Konstantin Ryabitsev wrote:
> Hi, all:
>
> I've been maintaining the kernel.org web of trust for the past 5+ years,
> and I wrote a number of tools to help me
On Tue, Oct 31, 2017 at 08:10:45PM -0400, murphy wrote:
> I got a signed notification from facebook (good signature, enigmail)
> that claims my GnuPG generated public key has a "recently disclosed
> vulnerability". This is the full text:
>
> We have detected that the OpenPGP key on your Facebook
On Thu, Dec 18, 2014 at 09:34:40AM -0500, realhost...@safe-mail.net wrote:
> I can't install. Please help
>
> root@server1:/var/www/gnupg-2.0.26# ./configure
> bash: ./configure: Permission denied
> root@server1:/var/www/gnupg-2.0.26# chmod -R 777 *
> root@server1:/var/www/gnupg-2.0.26# ./config
On Tue, Sep 30, 2014 at 02:01:39PM +0530, Sam M wrote:
> Hello.
>
> Not strictly a GPG question, but posting anyway.
>
> I need to test setting up of a private GPG keyserver integrated with a
> FreeIPA server. Has anyone done this and had success? I'm trying to figure
> out how to integrate the P
On Thu, Jul 03, 2014 at 10:56:30PM +1000, Fraser Tweedale wrote:
> On Thu, Jul 03, 2014 at 01:46:33PM +0200, Neal H. Walfield wrote:
> > At Thu, 03 Jul 2014 12:50:50 +0200,
> > Daniel Krebs wrote:
> > > da ich das gerade mit Matthias von der FSFE im Rahmen von
> >
On Thu, Jul 03, 2014 at 02:06:04PM +0200, Daniel Krebs wrote:
> Sorry!
> I picked the wrong language / list last time...
> So in English:
> What metaphors do you use when explaining people PGP? Two examples:
> 1. A lock with two keys?
> 2. A lock (public) and a key (private)
> Something completely
On Thu, Jul 03, 2014 at 01:46:33PM +0200, Neal H. Walfield wrote:
> At Thu, 03 Jul 2014 12:50:50 +0200,
> Daniel Krebs wrote:
> > da ich das gerade mit Matthias von der FSFE im Rahmen von
> > #EmailSelfDefense diskutiere, mal eine Frage: Welche Analogien benutzt
> > ihr, wenn ihr Menschen das Pri
Hi all,
An OpenPGP Best Practices article from riseup.net has been doing the
rounds today. Quite a lot of good info, especially regarding key
strength and expiry, and digest preferences.
https://help.riseup.net/en/gpg-best-practices
Cheers,
Fraser
_
On Tue, May 13, 2014 at 05:15:57PM -0600, Aaron Toponce wrote:
> I don't know if this is a bug, or if I am doing something wrong, so I might as
> well ask here. I ran the following command from my terminal, and cannot
> retrieve the fingerprint from the file:
>
> $ gpg --output 0xBB065B251FF49
Hi gnupg-users,
gcaff-0.2 is available immediately on PyPI[1] and GitHub[2].
[1] https://pypi.python.org/pypi/gcaff
[2] https://github.com/frasertweedale/gcaff
Release highlights:
* fixed a crash bug on platforms where pipes are unidirectional
(e.g. Linux)
* fixed a bug that caused the first
How about an armadillo?
On Sun, Jul 07, 2013 at 11:09:20PM +0200, Randolph D. wrote:
> http://www.pierros.de/images/Masken_Larven_Larve_Domina_schwarz.jpg
>
> 2013/7/7 reynt0 :
> > On 07.07.2013, Hauke Laging wrote:
> > . . .
> >
> >> Linux has its cuddly penguin, BSD its devil, openSUSE the
> >
Hi Jack,
The argument to --status-fd must be an open file descriptor. Not
sure of a way to open a raw file descriptor in expect, but you could
use mkfifo(1) and the --status-file argument instead, I think.
Regards,
Fraser
On Wed, Jun 05, 2013 at 11:14:27AM -0700, Jack Bates wrote:
> I am worki
o put it through its paces signing keys
from the linux.conf.au 2013 keysigning party, but I misplaced the
fingerprint list in the intervening weeks!) Any testing would be
appreciated, along with general feedback, bug reports and patches.
Regards,
Fraser Tweedale
pgpc9H1lT4W6R.pgp
Description
Hullo,
Just wondering if anyone knows of any scripts for collecting keys into
a keyring prior to a key signing party (i.e., for people who intend to
participate to submit their keys)?
Regards,
Fraser
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
On Sun, Apr 17, 2011 at 03:49:58PM -0700, Doug Barton wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Summary: A 3-word password (e.g., "quick brown fox") is secure against
> cracking attempts for 2,537 years.
>
> http://www.baekdal.com/tips/password-security-usability
>
> - --
>
15 matches
Mail list logo