On Montag, 3. Mai 2021 02:27:12 CEST Vincent Pelletier via Gnupg-users wrote:
> And on a related note: is there an RAM-only (ideally swap-disabled, no
> temporary file...) decipher-edit-encipher editor out there, to avoid
> having to write plain files to disk and leaving such traces ? I thought
> k
On Tue, 27 Apr 2021 20:32:04 +0200, Marek Stepanek
wrote:
> That means, no way to fiddle around with the headers (I called them like
> that) of the pw.gpg-file.
BTW, I just noticed that there was an on-list-only email which gave
details on how to extract and replace-during-decryption these, so
Thank you Vincent,
I am really ashamed! Yes you are right: encryption is normally done with a
public key. (I am blushing). I forgot, because nobody has a PGP-Key to
correspond with. The only use for my own PGP-key was to encrypt my own
Password-file, AND this with my private key, of course! Onl
Hello all,
Thank you for your answers. Hope I respond to your questions:
I encrypt in my Shell as follows - I am doing it just now with a Backup File on
my desktop:
$ gpg bu_pw_new.txt.gpg
gpg: WARNING: no command supplied. Trying to guess what you mean ...
gpg: encrypted with 2048-bit ELG k
Hello Marek,
On Sun, 25 Apr 2021 17:31:53 +0200, Marek Stepanek
wrote:
> I am unsure how GnuPG could pick up the wrong key, which does not exist in my
> key deposit. My guess is, that it is encrypted anyway with my private key
Beware of a possible misunderstanding here: encryption is done with
On 2021-04-25 at 08:41 +, Vincent Pelletier wrote:
> On Sat, 24 Apr 2021 15:19:07 -0700, "C.J. Collier"
> wrote:
> > you could maybe ask a pause admin to decrypt and
> > re-encrypt to a key that you own, sending you back the encrypted file.
>
> Two ideas from a gpg-internal *UN*aware point o
On Sat, 24 Apr 2021 15:19:07 -0700, "C.J. Collier" wrote:
> you could maybe ask a pause admin to decrypt and
> re-encrypt to a key that you own, sending you back the encrypted file.
Two ideas from a gpg-internal *UN*aware point of view:
- I assume gpg file encryption works by generating a random
Did you encrypt to yourself as well as to the pause key for some reason?
Are you a pause admin? It sounds like you encrypted to both yourself and
pa...@pause.perl.org for some reason. If that's the case and you cannot
find your private key, you could maybe ask a pause admin to decrypt and
re-encr
Hello all,
Perhaps somebody out there could be of some help. I use since 10 years now
GnuPG in my Shell to encrypt my Passwords. I only open this file, from time to
time to look up some pws which I need for banking, crypto or to check, which of
my many mails I used on which webpage.
After use