Hi
After upgrading my PC to Fedora 30
gnupg2-2.2.17-1.fc30.x86_64
gnupg2-smime-2.2.17-1.fc30.x86_64
gpgme-1.12.0-1.fc30.x86_64
gnutls-3.6.10-1.fc30.x86_64
libgcrypt-1.8.5-1.fc30.x86_64
libgpg-error-1.33-2.fc30.x86_64
a problem with decrypting came up.
Encryption works:
$ gpg --verbose --outpu
Hi Werner and all GnuPG hackers,
I would like to ask if it is possible in a future version of
GnuPG to have a new OpenPGP packet defined, which would allow
GnuPG users that their public key can be no longer uploaded
to the the old SKS keyserver Network, so that SKS rejects the
OpenPGP Public Key B
Hi,
I use the following command to test my new key setup:
$ gpg --batch --passphrase '' --yes --quick-gen 'Firstname Lastname
' rsa4096 cert 1d&& for u in sign sign encrypt; do gpg
--batch --passphrase '' --yes --quick-add-key $(gpg --with-colons -k
test | awk -F: 'NR==3{print substr($2,1
Stefan Claas via Gnupg-users wrote:
> It is assumed that the SKS Network will not go away in the near
> future and it is assumed once such a new non-compatible SKS packet
> would be supported by GnuPG it could be quickly supported by modern
> Hagrid, Mailvelope and hockeypuck.
Mmmh, while thinkin
On Fri, Jan 03, 2020 at 07:06:42PM +0100, john doe wrote:
> $ gpg -K
>
> -
> sec rsa4096 2020-01-03 [C] [expires: 2020-01-04]
> 3C5CFD620005347A62052A6B596CB80D30E8829D
> uid [ultimate] Firstname Lastname
> ssb rsa4096 2020-01-03 [S] [expires: 2020-
Stefan Claas via Gnupg-users wrote:
> Stefan Claas via Gnupg-users wrote:
>
> > It is assumed that the SKS Network will not go away in the near
> > future and it is assumed once such a new non-compatible SKS packet
> > would be supported by GnuPG it could be quickly supported by modern
> > Hagrid