ttps://www.funtoo.org/Keychain
- a couple of patches that we apply to the Debian packaging:
-
https://salsa.debian.org/debian/keychain/-/blob/debian/master/debian/patches/malformed-ssh-key.patch
-
https://salsa.debian.org/debian/keychain/-/blob/debian/master/debian/patches/empty-ssh-askpas
h Mastodon as well
- I just failed to find and re-toot a correspondig content.
Regards,
Peter
On Thu, 2021-12-02 at 09:57 +0100, Bernhard Reiter wrote:
> Hi,
> just compiled a new wiki page with history and hints
> about using Thunderbird with OpenPGP/MIME.
>
> https://wi
h have their own set of parameters, documented in the man pages
gpg(1) and gpg-agent(1) respectively. GnuPG consists of more binaries,
but those two are the major ones.
HTH,
Peter.
[1] https://lists.gnupg.org/pipermail/gnupg-users/2020-July/063825.html
--
I use the GNU Privacy Guard (GnuPG) in
er all these complications
and all these newly-devised communication protocols are indeed worth it.
Once again, not saying that the answer is always "no", but, well...
G'luck,
Peter
--
Peter Pentchev r...@ringlet.net r...@debian.org p...@storpool.com
PGP key:http://peop
include --batch (I assume you mistyped when you wrote
--no-batch) on the command line with the actual batch commands.
Not sure what you mean by through the API.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you
thing requiring human
interaction
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description
Hi,
On 27/07/2020 07:03, Ayoub Misherghi via Gnupg-users wrote:
> Will this scenario work?
Yes, as long as you also kill the daemons so they restart with the new
situation:
$ gpgconf --kill all
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send
On 20/07/2020 20:25, Ayoub Misherghi via Gnupg-users wrote:
> gpg: decryption failed: No secret key
Are your gpg.conf and gpg-agent.conf (or let's just say any .conf-file
in your GnuPG home, ~/.gnupg) empty? Do you get a pinentry popup asking
for a passphrase?
Peter.
--
I use the GNU
n quality. And
on the other hand there's a lot of bad advice on websites. It's an
unfortunate situation, but few people enjoy writing good documentation.
It is a very laborious process.
Sorry I can't be of better assistance.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combinatio
Sesame | gpg -r develop1 -e | gpg -d
This will pop up a pinentry for your passphrase, and since you set the
cache-ttl to infinity, it will never popup a pinentry again on
decryptions until you restart gpg-agent. It's a pretty good workflow
that uses all parts as they were intended.
HTH,
Pet
gnupg/output.png
These commented out lines are probably why the pinentry-mode line was
there in the first place. Do you know why these lines, both the
uncommented and the commented ones, are in your gpg.conf?
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can se
the interaction that you get? If that is where the problem lies,
it's good to know your operating system/distribution, your desktop
environment, and stuff like that.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some pri
decryption that isn't trivial to bypass once the attacker has read
access to storage, or perhaps some other form of access that is
definitely within scope of your threat model.
HTH,
Peter.
[1] https://gitlab.com/sequoia-pgp/sequoia
--
I use the GNU Privacy Guard (GnuPG) in combination wi
en the tools if needed.
Does the new TB implementation support TOFU? If so, you lose your TOFU
historical data and identity assertions when you would export/import to
a different OpenPGP implementation. That'd be a shame. Maybe there's a
need for a standardised interchange format for that.
P
d
systems. But it prevents needing packet surgery and inspection, instead
just using default mechanisms.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbra
might be a nice deterrant to the casual
opportunistic curious peeker. It's quick, a finger swipe takes less time
and effort than a good passphrase. But it's not proper security in my
book.
Peter.
[1] https://xkcd.com/538/
--
I use the GNU Privacy Guard (GnuPG) in combination with Enig
manages to copy your biometrics, you can't change them. You
could erase your fingerprints by taking a job processing pineapples on a
daily basis. And you could get plastic surgery for your face, but that
really puts the painful in "it's so painful to change your passphrase
everywhere&
is
inside a container encrypted to that private key..."
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.as
On 24/05/2020 18:03, Peter Lebbing wrote:
>> % gpg -o public-keys.gpg --export
Oh! That is perhaps not good enough :-). You need
$ gpg --export-options export-local-sigs -o public-keys.gpg --export
so you don't lose any non-exportable signatures. There's also
--export-optio
assphrase.
For instance, actually choosing "Correct Horse Battery Staple" is about
the worst thing you can do... :-)
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <
c data: your ownertrust declarations, TOFU bindings and
history.
You might want to omit the file random_seed. I forgot how important this
is these days. I believe it has gotten less important at some time.
But using Sherpa is probably a good bet.
HTH,
Peter.
--
I use the GNU Privacy Guard (Gnu
On Sat, May 16, 2020 at 04:55:11PM +0300, Peter Pentchev wrote:
> On Sat, May 16, 2020 at 01:36:10AM +0200, Stefan Claas wrote:
> > Peter Pentchev wrote:
> >
> > > On Fri, May 15, 2020 at 10:54:32PM +0200, Stefan Claas wrote:
> >
> > > > You know what,
On Sat, May 16, 2020 at 01:36:10AM +0200, Stefan Claas wrote:
> Peter Pentchev wrote:
>
> > On Fri, May 15, 2020 at 10:54:32PM +0200, Stefan Claas wrote:
>
> > > You know what, the most interesting thing of this ML for me is that
> > > when people, do a reque
On Fri, May 15, 2020 at 10:54:32PM +0200, Stefan Claas wrote:
> Peter Pentchev wrote:
>
> > On Fri, May 15, 2020 at 07:07:40PM +0200, Stefan Claas wrote:
>
> > > Mind you, I have only asked that GnuPG should support the import and
> > > processing of UID-l
On Fri, May 15, 2020 at 10:33:12PM +0300, Peter Pentchev wrote:
> On Fri, May 15, 2020 at 07:07:40PM +0200, Stefan Claas wrote:
> > Robert J. Hansen wrote:
> >
> > > > We now have the situation that either parents or teachers, etc. can
> > > > choose b
uth), his position is that
there is no reason for this violation to exist at all, there is no
reason for UID-less key blocks to exist at all, so GnuPG is quite right
in following the OpenPGP standard and not accepting them.
G'luck,
Peter
--
Peter Pentchev r...@ringlet.net r...@debian.org p..
On Fri, May 08, 2020 at 01:27:22PM -0400, Barry Smith wrote:
[formatting fixed, top-posting still considered weird]
> On Thu, May 7, 2020, 11:00 Peter Pentchev wrote:
>
> > On Thu, May 07, 2020 at 07:33:06AM -0400, Barry Smith via Gnupg-users
> > wrote:
> > [forma
rt of even the information that is stored in the keyring,
not to mention the information that is exported as a certificate
(what most people think of when they say "my public key")?
There are user IDs, there are self-signatures, there are
signatures from other parties that let you actually t
g --expert --full-gen-key
and then option (13) Existing key.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature
fied!
>
> --unwrap is not documented and has the minor problem that it also keeps the
> compression layer. However, gpgv groks that compression layer and works
> as with a standard signature. The signature is on SIGNEDFILE which gpgv
> outputs for you.
HTH,
Peter.
[1] https://l
users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
-== Jan-Peter Rühmann & Kuma =-
Gubkower Str.7 [ Tel.: +49 38205 65484 ] jan-pe...@ruehmann.name
18195 Cammin / Prangendorf [ F
_
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Thanks,
--
-====== Jan-Peter Rühmann & Kuma =-
Gubkower Str.7 [ Tel.: +49 38205 65484 ] jan-pe...@ruehmann.name
18195 Cam
.
A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
I hope Mozilla will rethink that.
Thanks,
--
-== Jan-Peter Rühmann &
uter
just asks it to decrypt something and gets the per-message shared secret
back from the card.
Then the PC will do the symmetric decryption of the actual data.
During regular use, knowledge about the private key contents never
leaves the smartcard, not for the briefest period.
HTH,
Peter.
--
. We
also find and document weaknesses in ProtonMail's "Encrypt-to-Outside"
feature. We justify our findings against well-defined security goals and
conclude with recommendations.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me
On 28/08/2019 12:07, Peter Lebbing wrote:
> Whether a compromise is game over depends on your scenario.
Sorry, I meant, it depends on your definition of "game over", definitely
*not* on the scenario.
I think it is perfectly acceptable to say "compromise = game over",
een.xterm-256color
2019-08-28 12:17:46 gpg-agent[21792] DBG: chan_9 -> OK
2019-08-28 12:17:46 gpg-agent[21792] DBG: chan_9 <- OPTION display=:0.0
2019-08-28 12:17:46 gpg-agent[21792] DBG: chan_9 -> OK
2019-08-28 12:17:46 gpg-agent[21792] DBG: chan_9 <- OPTION
xauthority=/home/peter/
er user decrypts something, store the decryption key in a
database. When the user decrypts the same file twice, use the stored
decryption key and decrypt that interesting file the attacker wants to
read instead.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
Full
stop.
> There should be good solution available IMHO. :-)
BYOD :-)
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signatu
he (or few people at least) can do well.
(And in general, announcing you will publish what someone is writing to
you is the nice thing to do and might even be required)
And heck, it might lend urgency to the topic should Werner subsequently
also ask them.
HTH,
Peter.
--
I use the GNU Pri
ort: I can't help with that.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signatur
signature that they are
(similarly to when a single new signature was uploaded to two different
SKS keyservers and these are coalesced on reconciliation).
It might be possible if you just change some bytes. I dunno.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You
09
which will search for the line containing that PID. Then you can see its
ancestry (the f option makes a -f-orest of parent/child relations).
There are more ways to investigate, but this seems a good start.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You
b can find
it encrypted to him at [1].
All those bounced mails were also addressed to the mailing list, so he
got a chance to read them anyway...
Cheers,
Peter.
[1] <http://digitalbrains.com/tmp/bounce.gpg>
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You
to use existing tooling. There is no reason for
the poison to be cryptographically valid. It just has to be slightly
expensive to verify. GnuPG doesn't even get to the bit where the
signature is validated, since the signing key isn't on the keyring, and
still, we have this DoS.
Peter.
--
I use
ves that appearance when you don't look too hard).
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
ical purposes.
There's a lot of chance for misunderstandings here. I started writing
something less ambiguous and stopped due to the amount of work :-).
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some
quot;I'm not going to parse this, find
>> another way to get me the proper data where it's not buried in crap".
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at
lready been explained.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description: OpenPGP
I agree.
Ah, then the discussion about OCaml is a moot point by now and can be
disregarded until the moment someone proposes to write the replacement
in OCaml :-D
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want so
colated through the ecosystem in the years
leading up to that new default.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature
of instructions and guidance, and I was a bit surprised
no one wrote it.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.a
r a form of trusted third party, or of anonymity. Every service has
its own trade-offs. And some stand out like a sore thumb. Again...
Facebook?! :-)
Cheers,
Peter.
[1] <https://lists.gnupg.org/pipermail/gnupg-users/2019-July/062359.html>
--
I use the GNU Privacy Guard (GnuPG) in combina
be made expensive, so
there should be other means to say "I'm not going to parse this, find
another way to get me the proper data where it's not buried in crap".
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mai
rs. DANE, WKD, Autocrypt, work on
keys.openpgp.org...
I thought this (there is no fix) was pretty solidly established by now
on this mailing list and elsewhere?
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
M
chive.org,
which I showed already in my earlier post:
https://web.archive.org/web/20190423190205/https://keybase.io/stefan_claas
That's a snapshot from 2 months ago, which will not go anywhere.
It kinda was my point posting that link ;-).
Peter.
PS: Before you blame archive.org: they
I had completely not considered that area of impact.
> "self-sigs-only" also better expresses what it does. If you have a
> better name, let us know.
No, I think it's a good name.
Thanks for making the rationale of the design clear!
Cheers,
Peter.
--
I use the GNU Pri
did ring a few bells, you
have in the past indicated you had wilfully fucked with other people's
OpenPGP keys to prove your point that it was possible. That's vandalism
in my book.
> EOD.
Neither of us gets to decide that for the other. BTW, you literally
asked a question ("Why s
On 03/07/2019 17:33, Stefan Claas via Gnupg-users wrote:
> Mmmhhh...Peter, if I should do this it should serve as help guideline
> for users wishing to do the same.
>
> Why?
Pfah. Stop rationalising. If this is your concern, create a website
where your offer your services to people w
;t come
anywhere near this protocol, it's just a downstream casualty of the
implications of the system.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrai
7;m going to leave it at that, because
I don't want the list to go down the road I so desperately want to go
personally. I'll take some solace from having recently read some
stronger qualifications in a public post.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigma
t fails to
check for new ones.
Here's a reproduction:
--8<---cut here---start->8---
$ pwd
/home/peter
$ rm .gnupg/dirmngr.conf
$ gpgconf --kill all
$ gpg --refresh-keys ac46efe6de500b3e
gpg: refreshing 1 key from hkps://hkps.pool.sks-keyservers.net
gpg
7;t think Enigmail respects dirmngr.conf, it just provides its own
set of keyservers. At least, if I delete them all from the Preferences
dialog of Enigmail, it prompts me to enter a keyserver, defaulting to
the literal text "undefined".
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG)
using
--keyserver-options import-minimal
instead of
--keyserver-options self-sigs-only,import-minimal
then the self-sigs-only behaviour can be folded into import-minimal,
avoiding creating yet another option in an already crowded option space.
HTH,
Peter.
--
I use the GNU Privacy Guard (Gnu
Is there a good use-case for the former? If the latter also filtered out
non-self-sigs in a very early stage like planned for self-sigs-only, in
addition to its current functionality in a later stage of import, it
would prevent the poison.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in
irmngr said "re-reading config". It just
didn't have an effect for some odd reason. For people thinking about
this: no, I don't use Tor for keyservers, it's not related to dirmngr
refusing to change keyservers when on Tor.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG)
On 03/07/2019 11:59, Peter Lebbing wrote:
> What is the difference in the end result between --keyserver-options
> self-sigs-only and --import-options import-minimal?
Ah, based on a new message I just read the penny dropped. self-sigs-only
can be made a default because it only appl
larity of self-sigs-only is not a useful feature
for users, and poisoned keys should just be imported by import-minimal
which could automatically imply the current functionality of
self-sigs-only.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me
the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description: OpenPGP digital signature
about deploying offline secure
systems probably aren't quickly scared off by an overly complicated
system ;-).
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://dig
's enough
the poison is on the keyring, as far as I can tell. Lacking the
knowledge to fix this, they will no longer be able to check signatures,
and probably be unable to read encrypted messages altogether.
For me, that'd be a nuisance.
For some people, it may have very large real-life
ant, since it still provides the incentive for attackers to
poison keys.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signat
es they impose on the use of their service. You don't
have a right to the use of their services under your conditions.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digit
ll.
I don't expect most of their clients to see through this theater. It is
their job to be open and honest about the consequences of their methods,
so their clients can make an informed choice whether they will go
through with it or not.
My 2 cents,
Peter.
--
I use the GNU Privacy Guard
at *extremely* bad form
of you. Made all the worse by you not explaining immediately that it
/is/ a referral link.
Could you please explain what the purpose of the data is? (Even with a
good explanation, I'd consider it basic hygiene to never click such
links, since the explanation cannot be ve
sed in GnuPG 2.1+ (and GnuPG 2.0 is
obsolete itself :-). So I'm afraid that won't work.
The agent and the homedir are tightly coupled. If you want to do
something special to the agent, I think you're going to have to go the
undesirable route of a separate homedir...
HTH,
Peter.
--
On 13/04/2019 14:34, Peter Lebbing wrote:
> Either reload the agent (this will make it forget all passphrases)
Of course I should have made that explicit. You reload the agent by:
$ gpgconf --reload gpg-agent
I should mention this before you start figuring out a way to send it
SIGHUP (which
of the API
or an implementation detail.
I did these things on the distribution-provided GnuPG on Debian
stretch/stable. So it's possible that it works differently on different
versions.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encry
# More information may be added in the future.
OK
> scd help
# NOP
# CANCEL
[...]
# KILLSCD
OK
> scd help learn
# LEARN [--force] [--keypairinfo]
[...]
#
# Note, that this function may even be used on a locked card.
OK
> /bye
--8<---cut here---end
aviour in the
past.
I note the Bash Reference Manual says:
| For almost every purpose, shell functions are preferred over aliases.
This use-case sounds like the "almost" bit :-).
Cheers,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me enc
t subkey, but we
still have the public part. It indicates knowledge of the existence of
the subkey, but it is marked as "ssb#" this time around, meaning we
don't have the secret key material anymore. So I /have/ answered your
question "how do I delete the secret subk
ight expose yourself to
attackers that way.
Depending on how the utility calls "gpg", it might be affected by your
alias and end up calling "gpg2".
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want
On 10/04/2019 17:24, Peter Lebbing wrote:
> gpg> delkey
Sorry, my fatigued head was being silly. That's for deleting the public
part, not the secret part. I don't think I know the way to delete the
secret part when you just want to delete some subkey.
Sorry,
Peter.
--
I use
te with a
"*" next to the "ssb" line which one(s) you have selected. Deselect by
another "key N"; it's a toggle.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is availab
Sorry for the noise. This message was intended to go to gnupg-devel, but
I screwed up. Please ignore it.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2
s.
Not really intuitive, but less bothersome than backups and restores. I
think maybe "keytocard" should have an option to just leave it on disk
as well. And then you can just insert all your smartcards you want the
key on and "keytocard" them one after the other without exit
k your best bet is to get that "2"
suffix in your muscle memory for when you use the command line.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrain
On 06/04/2019 18:50, Jean-David Beyer via Gnupg-users wrote:
> Mine's bigger than yours (older, too):
>
> $ gpg --version
> gpg (GnuPG) 2.0.14
Yeah, and it's probably high time to put gramps out to pasture as
well... ;-) That's a seriously old, unsupported version.
PG 1.4 and 2.1+ do not mix well in certain scenarios. You probably
encountered one.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digita
understand your
scenario.
The others are probably looking at an OpenPGP public key rather than an
SSH public key (again, a guess).
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is ava
rder to free up an USB slot.
Be warned that there are many cardreaders that will not work with larger
keys (where "larger" can already mean 2k) or even work reliably at all
with free software. So your mileage may vary a lot.
HTH,
Peter.
[1]
<https://www.floss-shop.de/en/security-
manually using gpgconf
| --launch dirmngr.
If you want to put this in the gpg.conf configuration file, drop the two
leading dashes (this is generally the case).
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some pr
only messages; try
> this if you don't get your posting through or notice it in the
> archive.
HTH,
Peter.
[1] https://lists.gnupg.org/mailman/listinfo/gnupg-users
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you
-o test.gpg -u 1819B624D400781C8988105EC97A5BCE0BFBF628
--passphrase-fd 3 --pinentry-mode loopback -s 3<<http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
g.org/pipermail/gnupg-users/2019-March/061789.html
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description: Open
end a plain-text e-mail rather than one that
has plain text as well as HTML content. If you don't know how to, I
think it is acceptable to send them as you do now (not entirely sure
about how strict that policy is).
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with
Hi,
On 26/03/2019 12:20, Shweta Tyagi wrote:
> gpg --batch --passphrase-fd n and it stops popup which asks for the
> passphrase
Please start a new thread with your question, it is something completely
different than the thread you replied to.
Thanks,
Peter.
--
I use the GNU Privacy
PG. For example to list all users of a
> certain private key.
:-)
Sorry for the long mail. I didn't see a lot of opportunity to shorten it
without losing clarity. If I were to introduce a misunderstanding, it
will only take even more time to sort out.
Cheers,
Peter.
--
I use the GN
fingerprints over the
old MD5 ones now.
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>
signature.asc
Description
.
> Should I open a feature request on this, or have you already done so?
I don't care enough to open a feature request. The development team's
time is limited after all.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if y
1 - 100 of 1659 matches
Mail list logo