Re: Proof for a creation date

2016-12-01 Thread Schlacta, Christ
The easiest way is to publish your code to a publicly controlled source with a signature on or before your desired date. Not sure if there's a *better* way. On Dec 1, 2016 7:43 PM, "Bertram Scharpf" wrote: > Hi, > > we all know that kidnappers do publish a picture of their > hostage holding up a

Re: [admin] postings from non-subscribers

2016-11-07 Thread Schlacta, Christ
What's annoying is when you're subscribed to a list and receiving posts, but for some reason when you try to post, it says you're not subscribed and getting moderated. I've had that happen, but I don't think it's happened here yet. On Nov 7, 2016 12:48 PM, "Ralph Seichter" wrote: > On 07.11.16 1

Re: [admin] postings from non-subscribers

2016-11-07 Thread Schlacta, Christ
twice*, and get annoyed. On Nov 7, 2016 1:24 PM, "Ralph Seichter" wrote: > On 07.11.16 21:59, Schlacta, Christ wrote: > > > What's annoying is when you're subscribed to a list and receiving > > posts, but for some reason when you try to post, it says you&

Re: What's the contextual definition of the term?... signature

2016-01-28 Thread Schlacta, Christ
I sent this a while ago in case anybody else wants to read it, but accidentally only to Don. On Jan 28, 2016 7:42 AM, "Schlacta, Christ" wrote: > Unofficially, but functionality and contextually correct.. A cryptographic > signature is a cryptographically strong hash of a messa

PAM authentication with gpg or ssh key

2015-09-28 Thread Schlacta, Christ
Hello list. I know this isn't exactly on topic, but I think it's asymptotically close enough to justify asking here. I'm looking for a way to authenticate myself to PAM (Specifically sudo) on a remote server over SSH, though possibly also on a local server using ssh-agent. if my gpg key is unlock

Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Schlacta, Christ
On Aug 16, 2015 2:27 PM, "Robert J. Hansen" wrote: > > > What other people do says nothing about me, and everything about > > them. > > Except that 99% of people who see that signature will think you have an > association with white supremacists. > > Should they? No. > > Will they? Yes. People

Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Schlacta, Christ
I'll reiterate that there's really no such thing as unwanted signatures. The more signatures on a key, the stronger the Web of Trust. End of story. Please try to understand that no signature is inherently unwanted. Your proposal, in any form, would weaken gpg on the whole by increasing the alread

gpa and gpgex in gpg 2.1.x releases for windows.

2015-07-02 Thread Schlacta, Christ
As a gpg user, I've been using the gpg 2.1.x releases for a while. as of 2.1.1, gpg for windows included gpa and gpgex. I used them. newer releases didn't remove these features, but didn't upgrade or include them either. Now it's difficult if not impossible to install gpa and gpgex with gnupg 2

Re: Difference Kleopatra vs WinPT

2014-11-29 Thread Schlacta, Christ
You're confusing gpa and winpt. Gpa is the default utility included with winpt, but kleopatra is also included with winpt. Comparison wise, kleo has more features, but gpa's futures are more... useful? I find myself using gpa daily, and kleopatra only on rare occasion On Nov 28, 2014 11:41 PM, "Ben

Re: Encryption on Mailing lists sensless?

2014-11-21 Thread Schlacta, Christ
On Nov 21, 2014 8:55 PM, "Ingo Klöcker" wrote: > > On Thursday 20 November 2014 14:36:35 Schlacta, Christ wrote: > > On Nov 20, 2014 1:58 PM, "Ingo Klöcker" wrote: > > > On Tuesday 18 November 2014 22:43:18 MFPA wrote: > > > KMail encrypts an

Re: Symmetrical encryption or ...

2014-11-21 Thread Schlacta, Christ
For a password safe you might look into existing solutions, such as keepass(x) or other similar password storage solutions On Nov 21, 2014 10:29 AM, "Dave Pawson" wrote: > Thanks Robert. I'll give it a try. > > regards Dave P > > On 21 November 2014 18:24, Robert J. Hansen wrote: > >> Only I use

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Schlacta, Christ
So to summarize, the best way to try this attack would be to encrypt lots of small messages to a dummy key and a target key because the only knowable plaintext is the session key. However, there's no known or reasonably suspected method of plaintext attack anyway, so all this data is believed to be

How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Schlacta, Christ
I know some encryption schemes reveal more information about the keys used when an attacker has both the plaintext and the ciphertext. In general, how much information does GPG reveal in such situations? How much plaintext/ciphertext matched data would an attacker need (An order of magnitude is fi

Re: Encryption on Mailing lists sensless?

2014-11-20 Thread Schlacta, Christ
On Nov 20, 2014 1:58 PM, "Ingo Klöcker" wrote: > > On Tuesday 18 November 2014 22:43:18 MFPA wrote: > KMail encrypts an individual copy for each BCC recipient. I thought > Thunderbird+Enigmail would also do this. > > Any mail client not doing this completely subverts BCC (unless --throw-keyids > o

Re: Encryption on Mailing lists sensless?

2014-11-17 Thread Schlacta, Christ
I wouldn't say invite only. Contrarywise, when you send the subscribe email, in the immediate, automatic response would be the public and private key, optionally encrypted to the recipient. Open enrollment, public availability. Just making the data obfuscated in transit. On Nov 17, 2014 10:15 AM, "

Re: Encryption on Mailing lists sensless? (was: Re: GPG API: Open Crypto Engine)

2014-11-17 Thread Schlacta, Christ
Most of the technical reasons can be bypassed by making a single subscriber key (public and private) available as a part of the subscription process, but that eliminates most of the technical advantages of encryption, so it's really a moot point. On Nov 17, 2014 8:52 AM, "Matthias Mansfeld" < m.man

Re: DSA key sizes

2014-11-10 Thread Schlacta, Christ
On Nov 10, 2014 10:48 AM, "Robert J. Hansen" wrote: >> >> DSA 4096, 5120, and 8192 should be available when governments >> advocate 3072. > > > The USG does not advocate any particular key size. They've made DSA > available in three sizes (as of FIPS 180-something) to support a variety > of diffe

Re: DSA key sizes

2014-11-10 Thread Schlacta, Christ
I'm going to go out on a limb and suggest that gpg should support government sponsored cryptographic standards whenever possible, but should consider the highest government sponsored requirement as a minimum requirement to actually implement. DSA 4096, 5120, and 8192 should be available when govern

Re: Update on USG, Software, and the First Amendment

2014-10-28 Thread Schlacta, Christ
I'll add my +1 to the request On Oct 28, 2014 12:08 AM, "Bob Holtzman" wrote: > On Mon, Oct 27, 2014 at 02:20:36PM -0400, Robert J. Hansen wrote: > > Just received word back from a friend of mine who's a law professor > > focusing in electronic civil liberties, and is a former Commissioner of > >

Re: Back to normal now

2014-08-13 Thread Schlacta, Christ
You could have just booted in from the lxde DVD and reset your password... On Aug 13, 2014 11:22 AM, "da...@gbenet.com" wrote: > Hauke, > > Yesterday whilst figuring out what to do, I found that I was logged out - > my Linux box > refused to accept my password. > > Anyway having copied the conten

Re: Where to save passphrases?

2014-07-28 Thread Schlacta, Christ
As much as I'm sure there will be objections to this, I'd like to re-suggest that you utilize the "one password for all keyrings" method. So long as those keyrings are physically on premises, and you practice good password habits, such as never using your master password for remote services, chang

Re: Where to save passphrases?

2014-07-25 Thread Schlacta, Christ
I might suggest using the same passphrase you use for your password manager for GPG. So long as you use a strong passphrase and practice good password practices on this password, it should remain uncompromised. On Fri, Jul 25, 2014 at 2:36 PM, Mathias Bauer wrote: > * Sudhir Khanger wrote on Fri

Re: mailto with pgp fingerprint

2014-07-25 Thread Schlacta, Christ
On Jul 25, 2014 5:30 AM, "MFPA" <2014-667rhzu3dc-lists-gro...@riseup.net> wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Hi > > > On Wednesday 23 July 2014 at 9:02:23 PM, in > , steve wrote: > > > > Wouldn’t it be a nice solution, if key server software > > had a mechanism for use

Re: email bot for PGP/MIME PGP/Inline conversion

2014-07-14 Thread Schlacta, Christ
Verify, strip, resign. Of course each person would have to configure their own trusted MTA. If it got compromised, it could either falsely verify inbound mail to them, or spoof out bound mail as them. Dependent on which function it was configured to perform. On Jul 14, 2014 10:22 AM, "martijn.list

How to add secondary uid?

2014-07-13 Thread Schlacta, Christ
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've googled, and I've searched, and I've tried and I've screwed up and deleted without sending to keyserver... but I can't for the life of me figure out how to add my lesser used e-mails to my gpg key as secondaries. Every time I try, they become th

Re: how to do

2014-07-09 Thread Schlacta, Christ
Depending on how many users are expected to have access to this file, you can just maintain a public keyring that everyone has. You then have everyone encrypt to the list of everyone, and then anyone can decrypt it with their private key and password and re encrypt to everyone. This solution scal

Key server long propagation delays?

2014-07-07 Thread Schlacta, Christ
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I was recently setting up my new keys along with some other people, and I discovered that as soon as one of my cohorts sent their keys and recieved confirmation, I could retrieve the keys and they showed up. When I sent stuff to the key servers, howeve

Greetings everybody, new user here

2014-07-07 Thread Schlacta, Christ
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi everyone. I just signed up to this list and thought to introduce myself. I've been aware of gpg for a long time, but seldom have I had occasion to actually use it. Well, now I do, so I'm all signed up and introducing myself. As you can probably