This whole NSA blackmailing situation is causing strange reactions in you, sir.
Marcio Barbado, Jr.
On Sat, Sep 7, 2013 at 7:28 AM, Werner Koch wrote:
> On Thu, 5 Sep 2013 22:22, marcio.barb...@gmail.com said:
>> https://lists.fedoraproject.org/pipermail/announce/2013-September/003180.html
>
https://lists.fedoraproject.org/pipermail/announce/2013-September/003180.html
Marcio Barbado, Jr.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
http://lwn.net/Articles/461236/
Marcio Barbado, Jr.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
https://twitter.com/#!/csoghoian/status/98116328677834752
On Fri, Jul 22, 2011 at 9:07 PM, Aaron Toponce wrote:
> On Fri, Jul 22, 2011 at 09:37:09PM +0200, Michel Messerschmidt wrote:
>> set pgp_auto_decode = yes
>
> Perfect! That was the variable I was looking for! Thanks!
>
> --
> . o . o .
Hi Daniel,
On Sat, Jul 23, 2011 at 2:21 PM, Daniel Kahn Gillmor
wrote:
> On 07/23/2011 07:04 PM, Marcio B. Jr. wrote:
>> On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen
>> wrote:
>>>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>>>
What can I say? My situation is a regular one. Privacy and/or
authenticity are needed in varying degrees.
Regards,
On Sat, Jul 23, 2011 at 2:16 PM, Robert J. Hansen wrote:
> On 7/23/11 1:04 PM, Marcio B. Jr. wrote:
>> You know, secrets are shared. 100% increase (at least) in "
Hi Aron,
you are somewhat arrogant.
Please read what I wrote till completion.
Regards,
On Fri, Jul 22, 2011 at 9:17 PM, Aaron Toponce wrote:
> On Fri, Jul 22, 2011 at 07:56:42PM -0300, Marcio B. Jr. wrote:
>> Hello Daniel,
>> sorry for such a delay; this has been a wild JU
Hello Robert.
On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen wrote:
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange method with block ciphers.
>
> Why is this a problem?
You know, secrets are shared. 100% increase (at least) in "exposin
Hello Daniel,
sorry for such a delay; this has been a wild JULY.
On Wed, Jul 6, 2011 at 4:09 PM, Daniel Kahn Gillmor
wrote:
> On 07/06/2011 01:28 PM, Marcio B. Jr. wrote:
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange me
e for you, is a question — not an
assertion, was on mathematical coherence.
Regards,
On Wed, Jul 6, 2011 at 4:37 PM, Doug Barton wrote:
> On 07/06/2011 10:28, Marcio B. Jr. wrote:
>>
>> Hello,
>> resuming this thread because I'm studying encryption options for KDE
Hello,
resuming this thread because I'm studying encryption options for KDE's
Kopete IM client.
So far, OTR adoption seems unjustifiable, really. I mean, it uses the
Diffie-Hellman key exchange method with block ciphers.
As of what I got from your (Robert) explanation plus some preliminary
conclu
Hacking the mind for fun and profit:
http://phrack.org/issues.html?issue=67&id=15#article
On Tue, May 17, 2011 at 8:58 PM, Robert J. Hansen wrote:
> On 5/17/2011 5:07 PM, Andre Amorim wrote:
>> It's Called INCEPTION !
>
> There are two major possibilities here: either the poster is correct, or
>
Hi,
this wiki, maintained by "Associação Software Livre", is dedicated to
coordinate (and subsequently, list) all of the keysigning parties in
Brazil:
http://wiki.softwarelivre.org/KSP/WebHomeEn
regards, and a harmonious 2011 to you all,
Marcio Barbado, Jr.
__
uot; scheme between them?
And if possible, is it prudent? What do you think of that?
Regards,
On Mon, Dec 6, 2010 at 5:38 PM, Grant Olson wrote:
> On 12/6/10 2:21 PM, Marcio B. Jr. wrote:
>> Hello,
>> sorry for this insistence. I just want to get it clearly.
>>
>> So, y
010 14:55:34 schrieb Marcio B. Jr.:
>
>> I've never used those external devices, and my private keys have
>> always been one place only located, a computer.
>>
>> That situation is a sort of "trade-off" for it keeps the referred keys
>> more protected/re
Ok,
let me utilize this thread to clarify something.
I've never used those external devices, and my private keys have
always been one place only located, a computer.
That situation is a sort of "trade-off" for it keeps the referred keys
more protected/restricted whereas it gives me little chance
Hello,
I think this Electronic Frontier Foundation's text may be of your interest[1].
It was written by American attorney Cindy Cohn.
[1] Eight Epic Failures of Regulating Cryptography:
http://www.eff.org/deeplinks/2010/10/eight-epic-failures-regulating-cryptography
regards,
Marcio Barbado,
I guess all you need is proper "read" and "write" privileges management.
Regards,
On Tue, Aug 3, 2010 at 9:51 PM, Snaky Love wrote:
> Hi,
> I would like to better understand: is gnupg good for big groups?
>
> I would like to encrypt communication in groups - not instant communication
> like
18 matches
Mail list logo