We exchange sensitive files with multiple corporate partners and would like
to set our keys up so that a single private key compromise does not require
generating new keys for all partners.
1) Should we generate separate pub / priv key pairs for all partners?
2) Generate a single pub / priv key fo
Thanks. Does it make sense to use a key-server? The public key will only be
use by a single partner organization. We were thinking about exchanging it
over e-mail.
Farhan
On Sat, Jul 18, 2015 at 5:37 PM, Greg Sabino Mullane
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: RIPEMD160
>
>
> >
The partners will generate their own keys so we can send them files. We're
generating separate pub/priv keys for each partner to receive files from
them. My question was that if we should generate separate pub/priv keys or
generate subkeys under a single signing key. Looks like the consensus is
tha
Does anyone use a GPG library to embed file encryption processes within
python code? Which libraries do you use? Any recommendations?
We looked at the ones below which are basically wrappers for the GnuPG
library.
http://pythonhosted.org/gnupg/
https://pythonhosted.org/python-gnupg/index.html
htt
If IMAP or ActiveSync are enabled for that Gmail ("Gmail for Work")
account, you may continue using whatever client you're using today.
-Farhab
On Tuesday, January 26, 2016, Bob (Robert) Cavanaugh
wrote:
> Hi All,
>
> My company is merging with another and the new corporate e-mail will use
> Gm
Probably out-of-scope for this list but, if the process is automated you'd
want to reduce the number of people with access to the keys to only staff
with need-to-know. Usually that translates to IT support / administrators.
Beyond that safeguards against people (specifically administrators) cannot
Oh man.. check a few of the previous list emails on this subject. They're
fairly detailed.
Farhan
On Wed, May 16, 2018 at 3:04 AM, eira wahlin wrote:
> Hi.
> I've been looking at a vulnerability in mail clients using pgp, described
> at efail.de. It is a technique where an attacker would inject