On Sat, 27 Feb 2010 03:52:02 + MFPA wrote:
> > (b) the person owns the information has the right to
> > control how it is disseminated, and
>
> The data subject does have various rights concerning the personal
> information that is about him.
Hello MFPA,
How far do the "rights" of the key hol
Hello MFPA,
During this whole debate, you have assumed one thing in your argument
that I don't believe anyone has pointed out as being flawed. You have
assumed that the person (I will call him John Doe) would have decided
to create a UID that contained the personal information that he wants
to ke
On Sat, 6 Mar 2010 03:59, talm...@orange.zero.jp said:
> Is this not the case with the newer v2.0 cards? My v2.0 card shows Max.
> PIN lengths .: 32 32 32.
Depends on the implementation - for those from ZeitControl this is
correct. Even the old standard says that the card announces the maximum
On Fri, 5 Mar 2010 22:30, r...@sixdemonbag.org said:
> The upshot: we now have an actual demonstration. The takeaway is that
> you should be very, very careful about hibernating your computer while
> passphrases are cached, or while GnuPG is actively processing a file.
You can protect against t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Paul
On Saturday 6 March 2010 at 8:55:48 AM, you wrote:
> On Sat, 27 Feb 2010 03:52:02 + MFPA wrote:
>> > (b) the person owns the information has the right to
>> > control how it is disseminated, and
This was someone's re-interpretation o
On 3/6/2010 2:02 AM, Robert J. Hansen wrote:
>>
>> Thanks a million for all this. The company "Volatile Systems" was
>> really messing with my google-fu.
>
> Err -- why?
>
> Volatile Systems is behind the Volatility framework, which is probably
> the best FOSS tool going right now for Windows me