scripting gpg

2011-05-04 Thread Jon Drukman
I need to do the following: - when a new machine is created, automatically import a public key and give it full trust - be able to encrypt files with that public key without any interactive prompting (from a shell script/cron job) in other words, a machine has to go from virgin state (OS + softw

Re: scripting gpg

2011-05-04 Thread David Shaw
On May 4, 2011, at 7:01 PM, Jon Drukman wrote: > I need to do the following: > > - when a new machine is created, automatically import a public key and give it > full trust > > - be able to encrypt files with that public key without any interactive > prompting (from a shell script/cron job) > >

Re: scripting gpg

2011-05-04 Thread Jon Drukman
David Shaw jabberwocky.com> writes: > You're looking for the "--trust-model always" option. Add that to your options, and the trust model > becomes "if it's on my keyring, it's fully trusted". It's up to you to make sure that only keys that are fully > trusted are on your keyring, of course. :

Re: scripting gpg

2011-05-04 Thread Jerome Baum
On Thu, May 5, 2011 at 02:19, Jon Drukman wrote: > putenv('HOME=/tmp/gpg'); > @mkdir('/tmp/gpg'); > At this point, you should be watching carefully. What if another user has created this directory to spoof the key? Use the appropriate command for creating a unique temporary directory. Should be

Storing secrets on other people's computers

2011-05-04 Thread M.R.
On 03/05/11 15:50, Daniel Kahn Gillmor wrote: Dropbox exposes your secret keys to dropbox employees (and anyone who can convince them to snoop): http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html That article makes no sense at all. a) Storing files containing yo

Re: Storing secrets on other people's computers

2011-05-04 Thread Robert J. Hansen
> Once these two extremely straightforward principles are observed... For the better part of a decade now I've volunteered to publish my private certificate in the _New York Times_ if someone will pay for the advertising space. With a strong passphrase that's not known to anyone else, the priva

Re: Storing secrets on other people's computers

2011-05-04 Thread Jerome Baum
On Thu, May 5, 2011 at 04:24, M.R. wrote: > On 03/05/11 15:50, Daniel Kahn Gillmor wrote: > Once these two extremely straightforward principles are observed, > it is perfectly OK to give the files containing your secrets to > someone/anyone else for safekeeping, "perfectly OK" is quite an extre

Re: Storing secrets on other people's computers

2011-05-04 Thread Jerome Baum
On Thu, May 5, 2011 at 05:34, Robert J. Hansen wrote: > > Once these two extremely straightforward principles are observed... > > For the better part of a decade now I've volunteered to publish my private > certificate in the _New York Times_ if someone will pay for the advertising > space. With

Re: Storing secrets on other people's computers

2011-05-04 Thread Jeffrey Walton
On Wed, May 4, 2011 at 10:24 PM, M.R. wrote: > On 03/05/11 15:50, Daniel Kahn Gillmor wrote: > >> Dropbox exposes your secret >> keys to dropbox employees (and anyone who can convince them to snoop): >> >> >> http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html > > That

Re: nothing so dramatic

2011-05-04 Thread Jeffrey Walton
On Thu, Apr 28, 2011 at 12:03 PM, M.R. wrote: > On 28/04/11 13:40, Johan Wevers wrote: >> >> I'm not so sure. Especially for human rights activists in, say, Syrie or >> Tibet, might not want the government to know when they are mailing with >> foreign journalists. > > Quite probably, but I do not

Re: Storing secrets on other people's computers

2011-05-04 Thread Anthony Papillion
The typical user most likely *does* believe files are locally encrypted then sent to Dropbox. But isn't that still pretty meaningless? If Dropbox is encrypting your file then you have to trust that Dropbox either can't decrypt the file or that, if they can, they would never under any circumstance c

Re: nothing so dramatic

2011-05-04 Thread Robert J. Hansen
> "A federal judge has ordered a criminal defendant to decrypt his hard > drive by typing in his PGP passphrase so prosecutors can view the > unencrypted files, a ruling that raises serious concerns about > self-incrimination in an electronic age." That court's opinion was predicated on the fact B