On 07.07.2014 23:49, eMyListsDDg wrote:
> in practice, do users of gnupg find that having multiple email account id's
> added to one key/pair using that key/pair to sign and/or encrypt emails &
> files more efficient to manage?
>
> curious how other uses in this situation manage their gnupg?
I'm
On 04.07.2014 09:22, Martin Behrendt wrote:
>> So are there analogies that can easily explain what signing does?
>
> My first try (I think someone wrote something similar before, just
> slightly different context): I give you (everyone) a key, to a
> (pad)lock which only I can build. And I lock my
On 03.07.2014 16:16, Werner Koch wrote:
> Signing is a very different thing than encryption. It has nothing to do
> with encryption. Using the terms decryption or encryption to describe
> signature creation and verification leads to confusion
I think the term «signing» leads to confusion, too. W
On 02.07.2014 10:27, Mike Cardwell wrote:
> FWIW, if you run your own mail system, this is a fairly trivial feature to
> set up. I've been doing it myself for about three and a half years. Here's
> how I do it, including links to the software:
>
> https://grepular.com/Automatically_Encrypting_all_
On 01.07.2014 23:28, Robert J. Hansen wrote:
> Assuming you mean "RSA as used in GnuPG", it is not feasible with the
> kinds of computers we know how to build. It will take science-fiction
> level breakthroughs in either engineering, mathematics, or both, to do this.
>
> The integer factorization
Dear gnupg users,
I have a question regarding a feature from mailbox.org [0]. This
provider offers to encrypt every unencrypted email you receive with your
public key. Thus only encrypted emails will be stored on the server.
Is there any security related problem, when an attacker has both, the
en