Hello John !
"John" wrote:
> load-extension C:\Progra~1\GNU\GnuPG\lib\idea.dll
> However, in Win 7 there is no such directory with the installation of Gpg.
> Should I create one below the current program installation directory or
> simply put it into the program's installation directory where
On Wed, 20 Jun 2012 07:56, laurent.ju...@skynet.be said:
> It's defined in GPG.CONF:
Nope. GnuPG-2 does not support loading of extensions. the option is a
dummy option. The reason for this is that crypto operations are done by
Libgcrypt and not by gpg.exe.
The next version of Libgcrypt wi
On 16/06/12 12:55, Mika Suomalainen wrote:
> Does the "gpg --edit-key" have a name?
I just call it using GnuPG from the command line...
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at htt
Hello.
When someone uses my public key to encrypt a message to me, what prevents
them from trying to use an encryption algorithm of his choice. In other
words, does the public key itself limit the options available to the person
sending the message? Thanks.
John
__
"Werner Koch" wrote in message
news:<87r4tamlnb.fsf__2553.46998242221$1340181117$gmane$o...@vigenere.g10code.de>...
On Wed, 20 Jun 2012 07:56, laurent.ju...@skynet.be said:
> It's defined in GPG.CONF:
Nope. GnuPG-2 does not support loading of extensions. the option is a
dummy option.
On Jun 20, 2012, at 1:10 PM, John wrote:
> Hello.
>
> When someone uses my public key to encrypt a message to me, what prevents
> them from trying to use an encryption algorithm of his choice. In other
> words, does the public key itself limit the options available to the person
> sending the
On 6/20/12 1:10 PM, John wrote:
When someone uses my public key to encrypt a message to me, what
prevents them from trying to use an encryption algorithm of his choice.
Nothing. They can use --cipher-algo to force whatever symmetric
algorithm they wish. This may wind up with a message that y
On Jun 20, 2012, at 1:18 PM, Robert J. Hansen wrote:
> On 6/20/12 1:10 PM, John wrote:
>> When someone uses my public key to encrypt a message to me, what
>> prevents them from trying to use an encryption algorithm of his choice.
>
> Nothing. They can use --cipher-algo to force whatever symmetri
On Wed, 20 Jun 2012 19:03, jw72...@verizon.net said:
> Is there any reason I should not place it in the same folder as the
> gpg.exe version 1.4.x and then make reference to it there? Thanks.
I think this is okay.
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
___
Hello John !
"John" wrote:
> When someone uses my public key to encrypt a message to me, what prevents
> them from trying to use an encryption algorithm of his choice. In other
> words, does the public key itself limit the options available to the person
> sending the message? Thanks.
Firs
On 06/21/2012 12:03 AM, Laurent Jumet wrote:
> default-preference-list S7 S11 S12 S13...
> personal-cipher-preferences S7 S11 S12...
> personal-digest-preferences H3 H8 H9 H10...
> personal-compress-preferences Z1 Z2 Z3 Z0
Please don't do this. It's error-prone. Those are machine-readable
number
Hello Robert !
"Robert J. Hansen" wrote:
> On 06/21/2012 12:03 AM, Laurent Jumet wrote:
>> default-preference-list S7 S11 S12 S13...
>> personal-cipher-preferences S7 S11 S12...
>> personal-digest-preferences H3 H8 H9 H10...
>> personal-compress-preferences Z1 Z2 Z3 Z0
> Please don't do this.
On 06/21/2012 01:36 AM, Laurent Jumet wrote:
> Don't you think that the command line could be too long, using the
> algorithms names instead of their tags?
No, because this is the sort of thing that usually goes in a gpg.conf
file. I can't think of a use case for default-preference-list on the
co
13 matches
Mail list logo