On 29/04/14 01:17, MFPA wrote:
> I have a key on the servers for just over four years now with a valid
> address that has been used for no other purpose and has not received a
> single email. OK, not a statistically valid experiment but I'm sure
> plenty of others have done similar.
I have a key o
Am Di 29.04.2014, 10:51:35 schrieb Peter Lebbing:
> But it hardly ever happens. 22 attempted scams in 3 years, and they
> arrive in batches. 7 batches to be precise; 7 distinct moments in
> time that scams arrived on that address.
That is interesting but if it is supposed to be an answer then I g
On 29/04/14 11:13, Hauke Laging wrote:
> if it is supposed to be an answer then I guess from the perspective of the
> "average" user it answers the wrong question.
It wasn't. It was an elaboration on one particular aspect of the answer MFPA
gave.
> "Will uploading my certificate to a public key
Hi,
Some keys stored on the public key servers have User IDs which seem to
be encoded with a different encoding than UTF-8.
For example the key with key ID 0xA8364AC589C44886 shows an invalid
character when viewed online:
http://pgp.mit.edu/pks/lookup?search=0xA8364AC589C44886
gpg is able to va
Hello
I'm having some problem while trying to use an hkps pool server as keyserver.
i am using gpg2 client version on a mac os x maverick os.
i have download the cacert file from the site and i verify that i have the good
one while testing with curl.
here is the configuration of my client :
ke
On Tue, 29 Apr 2014 11:11, martijn.l...@gmail.com said:
> Some keys stored on the public key servers have User IDs which seem to
> be encoded with a different encoding than UTF-8.
Right. Old PGP versions didn't care about the requirement for utf-8 and
used whatever the terminal was configured to
Eh, I consider the possibility of address harvesting an opportunity
for a bit of sport. I enjoy occasionally crafting a new regular
expression to make maildrop automatically toss a new strain of UCE.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Machines should not be friendly. Mach
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 29 April 2014 at 3:23:10 PM, in
, Mark H. Wood wrote:
> Eh, I consider the possibility of address harvesting an
> opportunity for a bit of sport. I enjoy occasionally
> crafting a new regular expression to make maildrop
> automatic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 29 April 2014 at 10:59:21 AM, in
, Peter Lebbing wrote:
> The problem with keeping an e-mail address secret is
> you need to keep it secret all of the time, while it
> only needs to leak to spammers once. Those are
> overwhelming od
I don't know how much of a spam problem there is by having keyservers harvested
for their e-mail addresses,
but if indeed it does become a problem, then maybe at that point, the e-mail
addresses should not be listed on the keyserver.
When a person generates a new key, the e-mail required by gnu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 29 April 2014 at 7:18:40 PM, in
, ved...@nym.hush.com
wrote:
> When a person generates a new key, the e-mail required
> by gnupg for key generation, can be listed as something
> benign such as n...@my.keys
Or, IMHO better still, le
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Monday 28 April 2014 at 8:22:44 PM, in
, Peter Lebbing wrote:
> - trust-model direct (and then set validity with
> "trust" command) - trust: ultimate (note: don't do
> this!)
But unless I am missing something, "trust: ultimate" is the only
Am Di 29.04.2014, 20:22:52 schrieb MFPA:
> validate a key without removing validity from
> all the keys on the keyring that are validated by signatures.
I don't understand that.
Hauke
--
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/Open
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Tuesday 29 April 2014 at 8:34:27 PM, in
, Hauke Laging wrote:
> Am Di 29.04.2014, 20:22:52 schrieb MFPA:
>> But unless I am missing something, "trust: ultimate"
>> is the only way the trust command can validate a key
>> without removing val
Hi,
I use '--keyserver --search-keys to get info on a number of
keys. As far as I can tell, that doesn't return an expiration date (if
that exists).
Are there other ways to easily check on the exp. date, besides importing
the key and then verifying the expiration date?
thanks,
koen
_
15 matches
Mail list logo