On Fri, 28 Jan 2022 13:02:03 -0700, jonkomer via Gnupg-users
wrote:
> After the user removal the domain owner is ipso facto
> GDPR compliant. However, he would prefer that a naive user
> (rightly or not) does not consider him unresponsive, and both
> sides have some interest in preventing any Int
On Tue, 27 Apr 2021 20:32:04 +0200, Marek Stepanek
wrote:
> That means, no way to fiddle around with the headers (I called them like
> that) of the pw.gpg-file.
BTW, I just noticed that there was an on-list-only email which gave
details on how to extract and replace-during-decryption these, so
Hello Marek,
On Sun, 25 Apr 2021 17:31:53 +0200, Marek Stepanek
wrote:
> I am unsure how GnuPG could pick up the wrong key, which does not exist in my
> key deposit. My guess is, that it is encrypted anyway with my private key
Beware of a possible misunderstanding here: encryption is done with
On Sat, 24 Apr 2021 15:19:07 -0700, "C.J. Collier" wrote:
> you could maybe ask a pause admin to decrypt and
> re-encrypt to a key that you own, sending you back the encrypted file.
Two ideas from a gpg-internal *UN*aware point of view:
- I assume gpg file encryption works by generating a random
On Tue, 23 Mar 2021 20:20:02 -0500, Jacob Bachmeyer wrote:
> There are two keys involved here: a PGP private key that is stored
> encrypted under a symmetric key. It appears that that symmetric key has
> been found to be weak. If an attacker can obtain the encrypted blob and
> crack the symm
On Mon, 22 Mar 2021 17:32:14 -0500, Jacob Bachmeyer via Gnupg-users
wrote:
> The difference is that you *know* an unencrypted key is lying around at
> risk of compromise, and you knowingly chose to take that risk when you
> chose to store the key unencrypted.
Pardon my non-gpg-familiarity, but
Hello,
First: this is announce is aimed at potential contributors (code,
documentation, ...) and experimentation (seeing what this is about,
identifying bugs, ...). It is not aimed at general use: do not use this
(yet) with valuable keys or data.
I would like to announce my implementation of a so