Going back to basics, IMHO, the best way to keep a backup of your
secret key is by splitting it first and giving parts of it to a number
of different persons/entities whom you trust to keep it safely.
Another requirement is to make sure those entities don't know each
other at all... you can do the
The most important thing in making archival CD backups is the dye, not
the reflective layer. Both gold and silver are used in the reflective
layer, and both are considered to be pretty much equivalent in terms of
aging.
The best dyes to use are phthalocyanine and metal stabilized cyanine.
It's di
> Keep it with other important papers of your life. And not necessarily
> printouts only, slowly burned CD kept in good conditions, or some solid
> state memory storage (like a small and cheap pendrive), can last a few
> years.
Burning a cd at low speeds doesn't neccessarily make it last longer.
I
On Thu, Jan 05, 2006 at 02:07:17PM -0500, Atom Smasher wrote:
> On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote:
>
> >from my experience, all keys for long-term, _safe storage_ (and after
> >revocation) should be kept with no passphases at all
> >
> >human memory is very volatile and some day you
On Thu, 5 Jan 2006, Samuel ]slund wrote:
In Sweden people with weapon licenses are required to either keep their
weapons locked up in a safe that is non-trivial to move or store them
with the "vital part" and ammunition removed and hidden in different
places.
Might be applicable?
==
On Thu, Jan 05, 2006 at 02:07:17PM -0500, Atom Smasher wrote:
> On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote:
>
> >from my experience, all keys for long-term, _safe storage_ (and after
> >revocation) should be kept with no passphases at all
> >
> >human memory is very volatile and some day you
On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote:
from my experience, all keys for long-term, _safe storage_ (and after
revocation) should be kept with no passphases at all
human memory is very volatile and some day you gonna need to decrypt an
old email encrypted with the key you revoked in 19
On Thu, Jan 05, 2006 at 12:21:00AM -0500, Atom Smasher wrote:
> has anyone given any thought to what would be the difference between
> carefully and carelessly making hard-copy backups of secret keys?
>
> i mean, it would be stupid to print a copy of ones secret key (with a weak
Atom Smasher wrote:
has anyone given any thought to what would be the difference between
carefully and carelessly making hard-copy backups of secret keys?
i mean, it would be stupid to print a copy of ones secret key (with a
weak passphrase) and leave it lying on a table next to a window
has anyone given any thought to what would be the difference between
carefully and carelessly making hard-copy backups of secret keys?
i mean, it would be stupid to print a copy of ones secret key (with a weak
passphrase) and leave it lying on a table next to a window. OTOH, a
printed copy of
10 matches
Mail list logo