Fwd: hard-copy backups

2006-01-14 Thread nidhog
Going back to basics, IMHO, the best way to keep a backup of your secret key is by splitting it first and giving parts of it to a number of different persons/entities whom you trust to keep it safely. Another requirement is to make sure those entities don't know each other at all... you can do the

Re: hard-copy backups

2006-01-07 Thread Kurt Fitzner
The most important thing in making archival CD backups is the dye, not the reflective layer. Both gold and silver are used in the reflective layer, and both are considered to be pretty much equivalent in terms of aging. The best dyes to use are phthalocyanine and metal stabilized cyanine. It's di

Re: hard-copy backups

2006-01-06 Thread Folkert van Heusden
> Keep it with other important papers of your life. And not necessarily > printouts only, slowly burned CD kept in good conditions, or some solid > state memory storage (like a small and cheap pendrive), can last a few > years. Burning a cd at low speeds doesn't neccessarily make it last longer. I

Re: hard-copy backups

2006-01-06 Thread Janusz A. Urbanowicz
On Thu, Jan 05, 2006 at 02:07:17PM -0500, Atom Smasher wrote: > On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote: > > >from my experience, all keys for long-term, _safe storage_ (and after > >revocation) should be kept with no passphases at all > > > >human memory is very volatile and some day you

Re: hard-copy backups

2006-01-05 Thread Atom Smasher
On Thu, 5 Jan 2006, Samuel ]slund wrote: In Sweden people with weapon licenses are required to either keep their weapons locked up in a safe that is non-trivial to move or store them with the "vital part" and ammunition removed and hidden in different places. Might be applicable? ==

Re: hard-copy backups

2006-01-05 Thread Samuel ]slund
On Thu, Jan 05, 2006 at 02:07:17PM -0500, Atom Smasher wrote: > On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote: > > >from my experience, all keys for long-term, _safe storage_ (and after > >revocation) should be kept with no passphases at all > > > >human memory is very volatile and some day you

Re: hard-copy backups

2006-01-05 Thread Atom Smasher
On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote: from my experience, all keys for long-term, _safe storage_ (and after revocation) should be kept with no passphases at all human memory is very volatile and some day you gonna need to decrypt an old email encrypted with the key you revoked in 19

Re: hard-copy backups

2006-01-05 Thread Janusz A. Urbanowicz
On Thu, Jan 05, 2006 at 12:21:00AM -0500, Atom Smasher wrote: > has anyone given any thought to what would be the difference between > carefully and carelessly making hard-copy backups of secret keys? > > i mean, it would be stupid to print a copy of ones secret key (with a weak

Re: hard-copy backups

2006-01-04 Thread Patrick Plattes
Atom Smasher wrote: has anyone given any thought to what would be the difference between carefully and carelessly making hard-copy backups of secret keys? i mean, it would be stupid to print a copy of ones secret key (with a weak passphrase) and leave it lying on a table next to a window

hard-copy backups

2006-01-04 Thread Atom Smasher
has anyone given any thought to what would be the difference between carefully and carelessly making hard-copy backups of secret keys? i mean, it would be stupid to print a copy of ones secret key (with a weak passphrase) and leave it lying on a table next to a window. OTOH, a printed copy of