Hi list,
this is my first message here.
Firstly, thank you Werner Koch and collaborators for such a superb software.
More than an enthusiast on cryptography, I am a Brazilian citizen,
concerned with the privacy and authenticity "components" involved in
information exchange transactions (not only
argument (you can set this in your gpg.conf too).
>
> Even after looking at the man page, I'm not entirely clear what "name"
> the "--local-user" option is after (e.g. is it a name of a local user on
> the system, or is it the uid name on the key).
>
> Reg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi list,
when symmetrically encrypting a file, e.g.:
$ gpg --output file.ods.gpg --symmetric file.ods
the command above generates a "gpg" extension encrypted AND compressed
file, is that correct?
How do I know which compression algorithm was used?
Hi David, thank you.
On Sat, Sep 5, 2009 at 1:11 PM, David Shaw wrote:
> On Sep 4, 2009, at 12:53 PM, M.B.Jr. wrote:
>
>> How do I know which compression algorithm was used?
>
> Unless you've overridden the default, it is ZIP.
>
Ok but in this point, my doubt is a
Hi list,
I've recently had access to this document, written by the "United
States Patent and Trademark Office" (USPTO) which basically tries to
ban software patents.
The memorandum is here:
http://www.uspto.gov/web/offices/pac/dapp/opla/2009-08-25_interim_101_instructions.pdf
the case is,
I'm rea
Gentlemen,
I really appreciate the comments you've made on the subject and the
little debates as well.
That was exactly what I was expecting.
Sometimes, regular users do not have the proper notion of whether some
functionality merits attention.
All in all, it looks like IDEA, even if totally fre
Hi David,
about the first "tidbit":
On Tue, Sep 22, 2009 at 6:08 PM, David Shaw wrote:
> First of all, someone has factored a 512-bit RSA key (the one used to
> protect a TI programmable calculator, it seems). It took 73 days on a
> dual-core 1900Mhz Athlon64. It took just under 5 gigs of sto
On Thu, Sep 24, 2009 at 2:21 PM, David Shaw wrote:
> On Sep 24, 2009, at 12:30 PM, M.B.Jr. wrote:
>
>> Hi David,
>>
>> about the first "tidbit":
>>
>>
>> On Tue, Sep 22, 2009 at 6:08 PM, David Shaw wrote:
>>>
>>> First of all,
Hi Werner,
On Fri, Sep 25, 2009 at 6:19 AM, Werner Koch wrote:
> On Thu, 24 Sep 2009 21:13, marcio.barb...@gmail.com said:
>
>> Is this a generic asymmetric premise?
>> I mean: is it valid both to the (computational) Mathematics behind
>> OpenPGP's and X.509's public keys' integers?
>
> Yes. Al
Hi list,
one lame confusion I'm facing now.
I was reading GnuPG's "Signing Subkey Cross-Certification" page [1],
and as a matter of fact, these two simple doubts did arise.
Suppose one provides the command:
gpg --gen-key
and chooses the default "DSA and Elgamal" option.
1st doubt:
DSA will be
Hi David,
On Wed, Nov 18, 2009 at 1:21 AM, David Shaw wrote:
> On Nov 17, 2009, at 10:00 PM, M.B.Jr. wrote:
>
>> both my public and private keys will be built upon my DSA primary key
>> and my Elgamal encryption subkey?
>
> I'm afraid I don't really understand
Thanks again, David.
The last dumb question, I promise, would be:
how can I see my primary key and my subkey as well?
On Wed, Nov 18, 2009 at 12:38 PM, David Shaw wrote:
> On Nov 18, 2009, at 8:49 AM, M.B.Jr. wrote:
>
>> Hi David,
>>
>>
>> On Wed, Nov 18, 2009
Hi,
On Sat, Nov 28, 2009 at 1:47 PM, David Shaw wrote:
>> The question is: what does GnuPG or OpenSSH do to slow down
>> password brute-force? I mean does the password derivation function use
>> some iterations? If so how many? Can I configure them? I guess so but
>> I couldn't find any data o
Suppose I'd like to "bind" the same key pair to more than one e-mail address.
Is it recommended? Any comments will be greatly appreciated.
Regards,
Marcio Barbado, Jr.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailma
Hi list,
I wish a great 2010 year for everybody!
On Sat, Jan 2, 2010 at 11:09 AM, Sven Radde wrote:
> Hello GnuPG-Users!
>
> With a new year comes a new keypair and this time I tried to use subkeys
> to separate my secret primary key from the "day-to-day"
> encryption/signing keys.
Concerning
Hi Daniel,
On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston wrote:
> I know it's sort of a contradiction in terms, but hear me out:
>
> The case I'm looking at is a High Availability environment hosting a
> database. The database is comprised of many Unix files, encrypted via AES,
> on shared s
Hi,
I have this simple question (sorry for it), regarding "digital rights
management".
As I understand, DRM in essence is the use of asymmetric cryptography,
which turns simple public keys into not-publicly-available public
keys.
Is it correct?
Regards,
Marcio Barbado, Jr.
_
Hello,
there's this guy, named Timothy Mullen who recently released this TGP
(Thor’s Godly Privacy) encryption utility for the cloud.
Timothy wrote (note that his complete text goes forwarded below):
"... I designed TGP with “encryption for the cloud” in mind. That
means that not only does TGP d
18 matches
Mail list logo