On Thu, 12 Sep 2013 15:55:24 +0200
"Jan" wrote:
> 2.1 Most people have only one PC and windows as operating system, so
> the linux/unix distribution should be installed on an USB device.
> This device must not be plugged into the PC if windows is running, in
> order to avoid a manipulation. Furthe
On Fri, 13 Sep 2013 09:19:10 +0200
NdK wrote:
> Il 12/09/2013 23:10, Marko Randjelovic ha scritto:
>
> > All the time I read suggestions on using USB sticks and I must say
> > people are crazy about USB sticks. It is more convenient to use
> > optical media then USB sti
Of course it is not safe. If you realy need a smartphone, use some of those
that are supported by Replicant OS. http://replicant.us/
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Wed, 30 Oct 2013 11:58:56 +0100
Sam Tuke wrote:
> If you want to help us, send your own statement about why GPG is important to
> you. Please keep it less than or equal to 130 characters, so it can be used on
> social networks.
>
> I'll collect them and pick the best for use now and in future
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 06 Nov 2013 13:17:16 +0100
Sam Tuke wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 03/11/13 22:01, Marko Randjelovic wrote:
> > I send five variants (but the best is all of them :) ):
>
> Tha
If an attacker got my secret key while it wasn't encrypted (no
passphrase) and then I put a passphrase, and then the same attacker
gets encrypted key, can he find out my passphrase based on difference
between non-encrypted and encrypted key?
--
http://markorandjelovic.hopto.org
Please make your
What I know is simple. I created a key today and tried it signing one file
and it worked. Now, few hours later, I cannot do anything, and a message is
wrong passphrase. I checked mod.time of secret keyring and it looks like was
not modified in meanwhile.
I am really confused, sure not have modifie
got corrupted since it is only one error?
2009/11/8 Ingo Klöcker
> On Sunday 08 November 2009, Marko Randjelovic wrote:
> > What I know is simple. I created a key today and tried it signing one
> > file and it worked. Now, few hours later, I cannot do anything, and a
>
I tried to revoke this key since after changing a passphrase on 2012-01-28 and
using it with new passphrase immediately after, after a few hours I could not
again be successfull (bad passphrase).
But revkey also askes for a passphrase.
Is there any way to revoke this key?
Best regards
0x0E8
I tried to revoke this key since after changing a passphrase on 2012-01-28 and
using it with new passphrase imidiately after, after a few hours I could not
again be successfull (bad passphrase).
But revkey also askes for a passphrase.
Is there any way to revoke this key?
Best regards
0x0E84
On 01/31/2012 01:58 PM, Werner Koch wrote:
> No. That is way we suggest to create and print out a revocation
> certificate right after key creation.
Thanks all to your suggestions.
I just got one idea. I have a backup. Can I unpack my secret ring file
backup and use it to generate revocation cert
11 matches
Mail list logo