If someone does not want to remember a passphrase then it goes to
something they have. Either some sort of key digital or "analog" or
biometric. Granted changing that is more limited but some get
creative, 10 fingers and 10 toes to choose from.
I don't think there is any perfect system. Passwor
I'd like to see it updated. I think it would be useful utility to have.
On 5/25/2020 2:49 PM, Robert J. Hansen wrote:
>> Having only heard of it just now, I was surprised it's not included in
>> Debian,
>> until I saw the word of caution and lack of commit history.
> The word of caution is becaus
> Having only heard of it just now, I was surprised it's not included in
> Debian,
> until I saw the word of caution and lack of commit history.
The word of caution is because I'm not actively maintaining it: the lack
of commit history is because it's literally a project I threw together
over a
John Scott via Gnupg-users wrote:
> On Sunday, May 24, 2020 12:18:51 PM EDT Robert J. Hansen wrote:
> > > But using Sherpa is probably a good bet.
> >
> > Good Lord, it's been a while since I wrote that. The Windows MSI
> > installer should still work, though. If there's interest in other
> >
On Sunday, May 24, 2020 12:18:51 PM EDT Robert J. Hansen wrote:
> > But using Sherpa is probably a good bet.
>
> Good Lord, it's been a while since I wrote that. The Windows MSI
> installer should still work, though. If there's interest in other
> formats, I'll see about updating it.
Having onl
On Mon, 2020-05-25 at 09:36 +0200, Peter Lebbing wrote:
> On 24/05/2020 21:39, Mark wrote:
> > I know there are other options maybe even some that use
> > biometrics to decrypt the database.
>
> I am very wary of biometrics for authentication purposes. There are so
> many examples where the vendor
On 24/05/2020 21:39, Mark wrote:
> I know there are other options maybe even some that use
> biometrics to decrypt the database.
I am very wary of biometrics for authentication purposes. There are so
many examples where the vendor assured us it was working really well,
and researchers easily crack
I forgot to mention there are 2 files in that gnupg directory that I'm
not sure the purpose of. I know private keys are stored in a directory
called private-keys-v1.d and public keys are stored in pubring.kbx. I do
have a file called PAPubring.gpg and PAsecring.gpg. They are only 111
and 113 bytes
Sorry misspoke.. I should've said put those files you listed in an
encrypted archive. I will grab Sherpa later and see how it works.
Thanks
On 5/24/2020 12:57 PM, Robert J. Hansen wrote:
>> I was thinking along the lines of backing up that entire directory into
>> an encrypted 7z file and then j
> I was thinking along the lines of backing up that entire directory into
> an encrypted 7z file and then just having to remember the password to
> that archive. I know there are other options maybe even some that use
> biometrics to decrypt the database.
Don't. GnuPG puts things in that director
I was thinking along the lines of backing up that entire directory into
an encrypted 7z file and then just having to remember the password to
that archive. I know there are other options maybe even some that use
biometrics to decrypt the database.
On 5/24/2020 10:23 AM, Peter Lebbing wrote:
> On 2
Good point, unless you can use some other passwordless authentication.
On 5/24/2020 10:44 AM, Felix Finch wrote:
> On 20200524, Mark wrote:
>> I think that could be addressed if all those files and directories are
>> stored within an encrypted archive (whatever your favorite is)
>
> Yes, but then
On 20200524, Mark wrote:
I think that could be addressed if all those files and directories are
stored within an encrypted archive (whatever your favorite is)
Yes, but then that needs a passphrase, and so on. I'm trying to cut back on
how many I have to remember.
--
... _._. ._ ._
On 20200524, Peter Lebbing wrote:
Hi,
On 24/05/2020 16:05, Felix Finch wrote:
Out of curiosity ... how safe are these files as is, assuming the
private key file has a good strong passphrase?
The safety of the private key purely depends on the strength of the
passphrase. Note that backups will
On 24/05/2020 19:11, Mark wrote:
> I think if all the important files are stored in an encrypted
> container, they should be pretty secure.
Just watch out for the catch-22 of "I lost my hard drive, let me restore
from that encrypted container. Hmmm, my only backup of my private key is
inside a con
I think that could be addressed if all those files and directories are
stored within an encrypted archive (whatever your favorite is)
On 5/24/2020 7:05 AM, Felix Finch wrote:
> On 20200524, Damien Goutte-Gattat via Gnupg-users wrote:
>> On Sat, May 23, 2020 at 09:35:54PM -0700, Mark wrote:
>>> I'm
Interesting points... I'm not sure I have all those files such as the
TOFU (have to actually read more about it). I think if all the
important files are stored in an encrypted container, they should be
pretty secure.
On 5/24/2020 9:16 AM, Peter Lebbing wrote:
> Hi,
>
> On 24/05/2020 16:05, Felix
> I have yet to try it but it sounds like a good idea. Does it run under
> Windows 10?
Let's see what I wrote:
>> The Windows MSI installer should still work, though.
Knock yourself out.
https://github.com/rjhansen/sherpa/releases/download/0.4.0/sherpa-0.4.0.msi
___
Thanks for all the tips on which files to backup and how to export to
for use in other apps (which is another thing I want to do later). MANY
years ago (mid 90s) I created some PGP keys with the old Norton PGP
program I was beta testing... Unfortunately those private keys are long
lost (several com
I have yet to try it but it sounds like a good idea. Does it run under
Windows 10?
On 5/24/2020 9:18 AM, Robert J. Hansen wrote:
>> But using Sherpa is probably a good bet.
> Good Lord, it's been a while since I wrote that. The Windows MSI
> installer should still work, though. If there's intere
On 24/05/2020 18:03, Peter Lebbing wrote:
>> % gpg -o public-keys.gpg --export
Oh! That is perhaps not good enough :-). You need
$ gpg --export-options export-local-sigs -o public-keys.gpg --export
so you don't lose any non-exportable signatures. There's also
--export-options backup, which impl
> But using Sherpa is probably a good bet.
Good Lord, it's been a while since I wrote that. The Windows MSI
installer should still work, though. If there's interest in other
formats, I'll see about updating it.
signature.asc
Description: OpenPGP digital signature
Hi,
On 24/05/2020 16:05, Felix Finch wrote:
> Out of curiosity ... how safe are these files as is, assuming the
> private key file has a good strong passphrase?
The safety of the private key purely depends on the strength of the
passphrase. Note that backups will have the passphrase that was set
On 24/05/2020 14:52, Damien Goutte-Gattat via Gnupg-users wrote:
> No, it’s not.
Absolutely not ;-)
> For the private and public keys however, instead of saving the files
> directly I’d recommend exporting them from GnuPG:
>
> % gpg -o private-keys.gpg --export-secret-keys
> % gpg -o public-keys
On 20200524, Damien Goutte-Gattat via Gnupg-users wrote:
On Sat, May 23, 2020 at 09:35:54PM -0700, Mark wrote:
I'm trying to figure out which files I need to backup to safeguard
my keys.
Everything that needs to be saved is in GnuPG’s home directory, which
on Windows should be `C:\Documents a
On Sat, May 23, 2020 at 09:35:54PM -0700, Mark wrote:
I'm sure this is a pretty stupid question
No, it’s not.
I'm trying to figure out which files I need to backup to safeguard my
keys.
I’m assuming you are using GnuPG 2.2 on Windows here (based on your
User-Agent).
Everything that need
I'm sure this is a pretty stupid question but I'm trying to figure out
which files I need to backup to safeguard my keys. All the docs I have
seen so far are for the older versions of GNUPG before it changed the
format of the keys.
Anyway what files (and/or folders) should I be backing up to a
27 matches
Mail list logo