On Sunday, October 19, 2014 01:18:29 PM you wrote:
> On 19/10/14 11:48, Sudhir Khanger wrote:
> > By important I mean
> > if you only had your secret key could get back to your original setup
> > ignoring the imported public keys.
>
> Yes; also ignoring all assigned ownertrust values.
>
> Public
On Sunday, October 19, 2014 01:26:03 PM Heinz Diehl wrote:
> Of course, you can omit/delete your pubring.gpg, if you like. However,
> unless you import a public key, you won't be able to communicate using gpg
> encryption.
Are you trying to say if I don't import pubring.gpg I won't import the
pre
On Sunday, October 19, 2014 01:22:07 PM you wrote:
> device-mapper's dm-crypt target together with LUKS (Linux Unified Key
> Setup). dm-crypt is somewhat the successor to encrypted loopback
> mentioned by Rob, and fixes some of the issues perceived in encrypted
> loopback. Some of those where subse
On Fri, Jan 24, 2014 at 04:37:11PM -0800, Justin Quakenbush wrote:
> wheres my gnupg folder?
>
Have you tried checking 'man gpg' (search for 'FILES')? It should be
~/.gnupg/ , echo $GNUPGHOME to make sure.
___
Gnupg-users mailing list
Gnupg-users@gnupg.
On Wed, Jan 22, 2014 at 01:29:11PM +0530, Rahul R wrote:
> Hi all,
>
> I am trying to run
>
> "gpg --symmetric test.txt"
>
> But its asking for Passphrase. Is there any way to skip this while running
> this command?
gpg --symmetric -o output.pgp --passphrase mypasshere input.txt
(found checking `
On Thu, Jan 16, 2014 at 05:34:34AM -0500, Don Warner Saklad wrote:
> Any way for two correspondents to set up gnupg within a few moments
> without having to become expert?
>
> The usual gnupg materials are very dense.
>
The most "complex" part is generating and sharing your public keys, which
can
On Tue, Jan 14, 2014 at 04:25:03PM +0800, khine wrote:
> I need to generate encrypted esd file. So, I would like to get public key.
> Please can you give me any suggestion?
Hey khine, if you want to encrypt a file, you need the public key *of the
recipient*. So you need to /generate a key/ only i
Wait a second - you can not simply hide a backdoor in a Common Criteria
evaluated operating system. There are too many entities that would need
to be involved in the process: The manufacturer, the evaluator, the
certification body and possibly a national regulator (Here for example
NXP, TÜV-IT, BSI
Hi,
> This does not happen here (Linux, though). I don't know how to tell gpg which
> key(s) to try first but if you use the command line then there's a work
> around: You may call gpg with
> --no-default-keyring
> --keyring
> --secret-keyring
> and point it at a file which contains one key only
Hi,
> On Fri, 17 Aug 2007 08:44, [EMAIL PROTECTED] said:
>
>> Werner, do you also plan to create binary releases (i.e. installers) for
>> Windows?
>
> See www.gpg4win.org - 1.1.2 has been released.
Isn't bzip2 compression supported any longer?
Because with 1.1.2 i get:
gpg --version
gpg (GnuPG
Hi Mark et al,
thanks for the Info !
Now when I try to
gpg --no-default-keyring --keyring
/home/sascha/gpg-skript/auto-gpg-keyring.gpg --options /dev/null
--no-secmem-warning --charset utf-8 --import /my/path/*.asc
it works for about 500 files - followed by:
gpg: keys 12345: public key "Som
Hello Everyone,
I am trying to write a Script that should use a separate keyring and a
separate config-file (not of the User, with which the Script is
running).
Somehow I fail to create a blank new keyring with gpg.
Is there any possibility to specify both (Keyring and config) via
Command line
12 matches
Mail list logo