A beautiful banker woman talks about the failed war on drugs in Latin America

2015-03-06 Thread Mr. Clif
She is on some global council to change drug policy: http://www.ted.com/talks/ilona_szabo_de_carvalho_4_lessons_i_learned_from_taking_a_stand_against_drugs_and_gun_violence#t-380552 Clif ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://l

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-22 Thread Mr. Clif
encrypted text] 2.) Decrypt text [Cipher-text is replaced with decrypted version; never saved to disk] 3.) Make your edits/changes 4.) Re-encrypt 5.) Click save-to-disk button On Sun, Jan 19, 2014 at 4:48 PM, Mr. Clif wrote: Hi Doug, Thanks for the comments. Yes the threat model is

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Mr. Clif
ck GPA here but wouldn't it be better to display the contents in a window? Well I realize that might be just what I want, and others have use cases that it works fine for. ;-) Clif On 01/19/2014 01:23 PM, Doug Barton wrote: On 01/19/2014 08:56 AM, Mr. Clif wrote: So I'm tryin

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-19 Thread Mr. Clif
On 01/19/2014 03:53 AM, Johan Wevers wrote: On 19-1-2014 7:50, Mr. Clif wrote: Does anyone use symmetric file encryption? Yes, but only for encrypting files for personal use. Not in communication with others. Same here. This is why I wrote that perl script, so I wouldn't have to rem

Re: Looking for simple wrapper for symmetric key file encryption

2014-01-18 Thread Mr. Clif
of some techniques for protecting them. Any pointers regarding best practices for symmetric file encryption would be much appreciated. Thanks, Clif On 01/17/2014 01:15 PM, Mr. Clif wrote: Greetings! I've been happily using pgp and gpg off and on for decades. One thing I

Looking for simple wrapper for symmetric key file encryption

2014-01-17 Thread Mr. Clif
Greetings! I've been happily using pgp and gpg off and on for decades. One thing I never quite figured out was what the best way to use it for encrypting sensitive files on disk. After doing that one has to remember to cleanup after themselves and delete all the leftover plaintext versions of