-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
El 27-04-2014 9:04, Simon Ward escribió:
...
> The password manager should clear or overwrite the clipboard after
> a short time, which should help. Keepass includes "timed clipboard
> clearing" in its feature list. Of course, there is still the
> qu
The fact that you can't use the plain text and the cipher text to recover the
private key is simply AMAZING. You really should mention that fact in the faq.
>> Is it polite to post saying that you want to sign keys with somebody
>> on a random mailing list?
>
> Depends a lot on the mailing list.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Sunday 27 April 2014 at 3:02:11 AM, in
, Robert J. Hansen wrote:
> Is anyone else getting spam like this the instant they
> post to the list?
Last week, in response to one of my postings to GnuPG-Users, I got a
series of five such message
On 27 April 2014 11:34:07 BST, "Robert J. Hansen" wrote:
>>execute arbitrary code with your credentials, you should simply
>> consider your GnuPG installation compromised whether you use the
>> clipboard or not.
>
>C&P is a time machine.
>
>If I enter a passphrase normally on Monday and my machi
On 27/04/14 12:34, Robert J. Hansen wrote:
> I think so, but I'm well-known for being barking mad.
"Woof" back at you.
> Generally speaking, it is suboptimal to enter passphrases via C&P. It
> makes it possible for a compromise tomorrow to discover the passphrase
> you entered today.
But I will
> Is this really a useful criterium?
I think so, but I'm well-known for being barking mad. Hornswoop me
bungo pony, dogsled on ice (red and black, it's their color scheme). By
the silverfish imperetrix whose incorrupted eye sees through the charms
of doctors and their wives...
(At some point it
On 27/04/14 03:36, Robert J. Hansen wrote:
> Long passphrases also silently encourage users to do risky things like
> cut-and-paste them. (It's very easy for malware to look at the contents of
> your clipboard buffer.)
Is this really a useful criterium? Sure, by not using the clipboard you might
s
Am Sa 26.04.2014, 22:02:11 schrieb Robert J. Hansen:
> Is anyone else getting spam like this the instant they post to the
> list?
At least I do. This has already been discussed recently.
> It seems as if one listmember might have a compromised PC which
> is sending out spam in response to anythi
list maintainer wants, though, I'll be happy to send the
full headers.)
Original Message
Subject: Re: Re: A few newbie Qs
Date: Sun, 27 Apr 2014 01:46:27 + (UTC)
From: Alyssa
Reply-To: brighteye...@mailingbuddies.com
To: robert j hansen
Hey cool you
> Which algorithm is most secure/is there more non-college-math info
> on the web somewhere (no wikipedia please)? IDEA, 3DES, CAST5,
> BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192,
> CAMELLIA256
It's kind of like asking whether King Kong or Godzilla is the best at
urban demoli
-- Oops replied off list. --
Your question about AES reminds me of a similar question I previously asked to
a different mailing list.
I found Falko's explanations credible and insightful. Maybe this is what you
were looking for. ;-)
http://lists.randombit.net/pipermail/botan-devel/2013-Februar
Hello,
These first two may be kinda a preferences thing, but
I'm no expert in the field and I could not read the
math even if I wanted to, so try to be easy on me.
Which algorithm is most secure/is there more non-college-math
info on the web somewhere (no wikipedia please)?
IDEA, 3DES, CAST5, BLO
12 matches
Mail list logo