Hello,
this is not GnuPG-specific, not even crypto-specific in the sense that I
guess no real change to any crypto tool or standard would be necessary.
Technically it's about a new MIME container usage but crypto-related. I
hope here are the right people to comment on that. Somehow I prefer
ge
The usual way it works here would be, in your example, for the dean to
send the recipients a message with "Please consider the request in the
attached message", and your message would be attached. That way, it is
the dean who requests something, and the PhD would be inclined to read
it.
HTH,
Am Mi 16.04.2014, 18:21:16 schrieb Peter Lebbing:
> The usual way it works here would be, in your example, for the dean to
> send the recipients a message with "Please consider the request in
> the attached message", and your message would be attached. That way,
> it is the dean who requests someth
Hello Peter,
Actually, I'm on a fresh sid Debian installed, I've use during install crypted
LVM volume for all my partitions excepted for /boot.
So now I've two files like these :
/etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier
I'm sure there are more qualified people to answer this, but since I've been
staring at pgp-mime for the last few months, I thought I would give a few
thoughts.
I believe you are asking, "is it possible to concatenate signatures, to create
a new signature block which is then used with pgp-mim
I also thought it would be preferable just to pass the message through
the person whose prestige would, if lent, get you a reading. The
problem with having the message come from an unknown is that it is
coming from an unknown. If the message is not opened, it doesn't
matter whose signatures are o
Hello,
Thanks for your answer, I've already see your article and I asked to me many
questions.
But in my case I've already crypted lvm partition with a passphrase, so can I
only generated key.txt file and encrypt it with my gnupg key and add in cryptab
file :
/etc/cryptab :
sda5_crypt UUID=y
I believe this blog article could be a useful reference:
https://blog.kumina.nl/2010/07/two-factor-luks-using-ubuntu/
This happens to work beautifully w/ the Yubikey NEO and the GPG Applet
The article does omit any backup measures, so I added a separate long
passphrase to use in the backup case -