Hi all,
I've been searching and searching, and have failed to find any
documentation or tutorial that indicates the proper way to verify a
signature from a program. The problem is that I want not to verify
that *anyone* signed a message, but rather to verify that *someone in
particular* signed it
On Tue, Nov 24, 2009 at 12:16:29PM -0500, David Roundy wrote:
> Hi all,
>
> I've been searching and searching, and have failed to find any
> documentation or tutorial that indicates the proper way to verify a
> signature from a program. The problem is that I want not to verify
> that *anyone* sig
On Wed, Nov 25, 2009 at 01:44:35PM +0200, Peter Pentchev wrote:
> On Tue, Nov 24, 2009 at 12:16:29PM -0500, David Roundy wrote:
> > Hi all,
> >
> > I've been searching and searching, and have failed to find any
> > documentation or tutorial that indicates the proper way to verify a
> > signature f
Hi All,
This is a complete n00b question, but I still need to get an opinion on
this.
I've created myself a public/private key and got a bit concerned that if my
harddrive fails, I lost the key and all data I've ever encrypted using it.
Advice I find around the net suggest saving it to a floppy
On Wed, Nov 25, 2009 at 9:20 PM, Brian O'Kennedy wrote:
> Hi All,
> This is a complete n00b question, but I still need to get an opinion on
> this.
> I've created myself a public/private key and got a bit concerned that if my
> harddrive fails, I lost the key and all data I've ever encrypted using
Brian O'Kennedy wrote:
> This is a complete n00b question, but I still need to get an opinion on
> this.
We were all new once. :) Welcome to the list!
> All of these make sense to me, but aren't compatible with my ability to
> lose physical things. So, what would the risks be of me using
> s
Thanks for the useful tips - I think I'll go the encrypt-upload-to-email
route plus an additional paperkey option stored at relatives house in case
of email service going down.
thanks,
Brian
2009/11/25 Ciprian Dorin, Craciun
> On Wed, Nov 25, 2009 at 9:20 PM, Brian O'Kennedy
> wrote:
> > Hi A
So this implies that I could safely upload my ascii-armored private key to
an email server without fear (assuming of course that my passphrase is
secure and large). What symmetric encryption is typically used on the key
itself? I'm assuming that this level of encryption is secure enough to not
wor
Brian O'Kennedy wrote:
> So this implies that I could safely upload my ascii-armored private
> key to an email server without fear (assuming of course that my
> passphrase is secure and large).
Correct. You just have to make *absolutely certain* your passphrase is
unguessable. If someone is abl
Would you define ascii-armored
--- On Wed, 11/25/09, Brian O'Kennedy wrote:
From: Brian O'Kennedy
Subject: Fwd: Backup of private key
To: gnupg-users@gnupg.org
Date: Wednesday, November 25, 2009, 4:19 PM
So this implies that I could safely upload my ascii-armored private key to an
em
FederalHill wrote:
> Would you define ascii-armored
binary -> base64 conversion.
http://en.wikipedia.org/wiki/Base64
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
11 matches
Mail list logo