-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sunday 1 March 2015 at 6:58:19 PM, in
, Jonathan
Schleifer wrote:
> That "wasted energy" is a lot less than the energy we
> currently waste on spam,
I suspect my computer wastes very little energy in downloading and
storing a few dozen spam m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sunday 1 March 2015 at 10:43:25 PM, in
, Jonathan
Schleifer wrote:
> The goal is that the
> proof of work for a single message takes 4 minutes.
Currently at work, when I ask somebody a question by email it is not
unusual to see the CC of the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/02/2015 04:50 AM, Chuck Peters wrote:
> Kristian Fiskerstrand said:
You wouldn't need the keyservers to be involved in this at
all. Anyone could set up such a mail verification CA outside
of the keyserver network.
>
> How
Hello,
> On Behalf Of Patrick Brunschwig
> Sent: Sunday, March 01, 2015 3:42 PM
> The idea I have in mind is roughly as follows: if you upload a key to
> a keyserver, the keyserver would send an encrypted email to every UID
> in the key. Each encrypted mail contains a unique link to confirm the
>
Am 28.02.2015 um 13:31 schrieb Peter Lebbing:
> PS: By the way, my ISP and some of it's employees are in a perfect position to
> do a man in the middle.
No doubt about it. And we actually don't know how they "use" their position.
Well, looking at some sort of collaboration published a few weeks
On Sunday 01 March 2015 at 20:11:10, Werner Koch wrote:
> > was a bug report for the patch? I would gladly write one if that would
>
> Well written bug reports are always appreciated.
I believe the main thing that Werner is mentioning here is that
analysis of an unwanted situation and a fix are tw
Hi Neal,
On Saturday 28 February 2015 at 12:27:05, Neal H. Walfield wrote:
> http://wiki.gnupg.org/LDAPKeyserver
and while you were at it, you have also went through a number of wiki pages
correcting and improving the format and language!
Thanks and welcome to the club of wiki.gnupg.org help
On Sun, 1 Mar 2015 23:43, js-gnupg-us...@webkeks.org said:
> I don't really agree with that. The goal is that the proof of work for a
> single message takes 4 minutes. At that rate, sending spam really is not
So you can send 360 mail a day. Assuming your 24/7 business make 700
Euro a day each m
At Mon, 2 Mar 2015 12:35:30 +0100,
Bernhard Reiter wrote:
> On Saturday 28 February 2015 at 12:27:05, Neal H. Walfield wrote:
> > http://wiki.gnupg.org/LDAPKeyserver
>
> and while you were at it, you have also went through a number of wiki pages
> correcting and improving the format and languag
Il 01/03/2015 21:54, Peter Lebbing ha scritto:
> No, I'm talking about that as well. And I don't think the fingerprint of
> the host is part of the signed data or the signature. Why do you think the
> fingerprint of the host is part of that?
Because I didn't remember well the SSH protocol...
> By
On Mon, 02 Mar 2015 00:34:55 +0100 Daniel Kahn Gillmor wrote:
> On Sun 2015-03-01 20:01:05 +0100, Werner Koch wrote:
> > On Sun, 1 Mar 2015 15:32, rp...@kcore.de said:
> >
> >> is there a command line utility that takes a PGP/MIME encrypted
> >> message (a plain RFC 2822 text file) and outputs an
On 02/03/15 11:35, Stephan Beck wrote:
> Sticking to that "perfect position argument", in what kind of position are
> (would be) the people that control (packaging of) your distro? (Just
> curious.)
I think they basically completely control my system. For individual Debian
Developers, it might ne
Hello,
I am Deepak Saxena from Gemalto (formerly SafeNet Inc) and I am curious if
smart cards are supported for storing the keys which will be used to encrypt
files or email using gpg4win.
I have installed gpg4win 2.2.3 and want to test SafeNet smart cards.
I am getting following error:
[cid:im
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Monday 2 March 2015 at 9:40:12 AM, in
, Jonathan
Schleifer wrote:
> It's not only your computer.
Likewise, it is not just my computer that would be wasting orders of
magnitude more energy on "proof of work" for all outgoing messages
than it c
This month's Wired has an article about encryption for voice and text using
pgp, and intercompatibility between i-phone and android while using it.
http://www.wired.com/2015/03/iphone-app-encrypted-voice-texts/
I wouldn't trust it with my real key, but would make a new 'smartphone' key
signed w
On 01-03-2015 22:01, flapflap wrote:
> Just think about the "grandchild trick" ([0], unfortunately not in
> English) which is a method where the criminals phone (often elder)
> people and tell them that they are a grandchild, nephew, or other remote
> relative and need some money for some reason
On Mon, 02 Mar 2015 22:24:45 +0100, Johan Wevers
wrote:
> For once, I've never heard of the police
> trying something like this to obtain confessions or information: the
> chance of failure in an indivicual case are too big.
I'm guessing the reason is more that this would be a legal mine field
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/02/2015 12:12 PM, Kristian Fiskerstrand wrote:
> On 03/02/2015 10:16 AM, gnupgpacker wrote:
>> Hello,
Seems I inadvertently sent this message only directly without CCing
the list
>
>
> ..
>
>
>> This procedure should be implemented in key
On 01-03-2015 13:27, Jonathan Schleifer wrote:
> You are assuming it will be spoofed for everyone. It could just
> be spoofed for you. Anybody who can MITM you and give you a fake
> SSL cert that you accept
Well, perhaps they could if the ONLY way I communicated wit someone
would be electronicall
On 02-03-2015 22:23, ved...@nym.hush.com wrote:
> http://www.wired.com/2015/03/iphone-app-encrypted-voice-texts/
>
> I wouldn't trust it with my real key, but would make a new
> 'smartphone' key signed with my real key, and comment it as
> for phone use only.
You can't, it uses an own key scheme
20 matches
Mail list logo