Re: Problem: Several selfsig

2015-06-22 Thread Nomen Nescio
trickyboy wrote: > I generated a GnuPG certificate but I see that I have two > self-signatures for each of my userID: > > gpg> check > uid John Doe > sig!3ABCD1234 2015-06-18 [self-signature] > sig!3ABCD1234 2015-06-14 [self-signature] > uid John Doe > sig!3ABCD1234

Re: Gnupg Decryption Question

2015-07-24 Thread Nomen Nescio
David Carter wrote: > We currently use Gnupg 1.4.10 > > This is a sample of how we would call > gpg to encrypt a text file prior to transmission: > > gpg -c -o DataFile.gpg --batch --compress-algo 1 --cipher-algocast5 > --passphrase KeyValue DataFile.txt > > The files that we receive share

Re: Windows editor destroys gpg.conf

2014-01-15 Thread Nomen Nescio
i do testing unix line end conf is ok on windows of course dos line end is ok too utf8-bom, unicode, unicode-be file formats all fail > gpg -K --options utf8-bom-conf.txt gpg: utf8-bom-conf.txt:1: invalid option > gpg -K --options unicode-be-conf.txt gpg: unicode-be-conf.txt:1: invalid option

Re: US banks that can send PGP/MIME e-mail

2013-03-07 Thread Nomen Nescio
On 2013-02-23, Jerry wrote: > > Well, each to his/her own I suppose; however, I would not approve of > the file being sent to my PC regardless. There is always the > possibility of the email being intercepted and exploited or my PC being > compromised. There is a security element to this, but it

Re: US banks that can send PGP/MIME e-mail

2013-03-07 Thread Nomen Nescio
>Figuring out how to install an app is not the problem. Figuring out >how to *use OpenPGP* is the problem. The app is not the same as the >amount of specialized knowledge required to use the app successfully. The installation problem takes care of the other. Hushmail users need not know any mor

Re: gpg for anonymous users - Alternative to the web of trust?

2013-03-31 Thread Nomen Nescio
There is a related issue. Assume you are a tor user. Go to irc.oftc.net, channel #tor. This is where tor users hang out. There you will find some person on there called "arma." This is one of the main authors for Tor. But is he? Are you really on some MITM attack IRC server with all fake b

what is a default anonymous key to look like?

2013-05-22 Thread Nomen Nescio
Hi, I would like to create an "anonymous" key to be posted or handed out. I don't want to fill in real name, email, etc. Is there a way to do this? Or at least some common default options for these fields? ___ Gnupg-users mailing list Gnupg-users@gn

Re: how to decrypt messages to hidden recipient

2013-05-24 Thread Nomen Nescio
BUMP please. I am having issues with the --try-secret-key, it is giving "invalid command" or something. My bash is a bit crappy but I am sure someone on this list can tell me the answer in 2 seconds. gpg --try-secret-key m...@gpg.key file or what? Thanks _

Re: [OT] Why are you using the GPG / PGP keys?

2013-05-30 Thread Nomen Nescio
"Robert J. Hansen" wrote: > Not even then. "Plausible deniability" is a myth, an ephemera. One > person may believe your denials; another may not. Whether they > believe you will have much more to do with how honest you've been the > rest of the time than with the particulars of cryptography

Re: [OT] Why are you using the GPG / PGP keys?

2013-06-01 Thread Nomen Nescio
> But it can also mean it can mean PLAUSIBLE GUILTY (PG). And > while PD works only once, PG can go ad infinitum. And don't forget > there are some organisations which activate worldwide for which any > suspicion means guilty without any respect for the facts. > So does threatening the public-

Re: best practice for handing over the private key

2013-08-03 Thread Nomen Nescio
Martin T wrote: > I need to create a public and private key pair for a person > representing an organization, upload the public key to RIPE(regional > Internet registry in Europe) public server, create some database > entries using those public and private keys and finally hand over the > private

storing password lists in mails to myself on IMAP?

2007-02-13 Thread Nomen Nescio
I use thunderbird on my laptop and desktop with an IMAP server, and I've been mailing myself encrypted mails with website passwords so I have access to them on both computers. This is just as secure as encrypting a file and copying it onto both computers without using e-mail as a medium, right? O

Re: storing password lists in mails to myself on IMAP?

2007-02-15 Thread Nomen Nescio
Nomen Nescio wrote: > I use thunderbird on my laptop and desktop with an IMAP server, and > I've been mailing myself encrypted mails with website passwords so I > have access to them on both computers. > > This is just as secure as encrypting a file and copying it onto both

Re: storing password lists in mails to myself on IMAP?

2007-02-16 Thread Nomen Nescio
Robert J. Hansen wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Nomen Nescio wrote: > > Given that this is an IMAP account it's possible those temp > > files exist on the IMAP server. :-( > > Can you point me to an IMAP client which does this

Re: storing password lists in mails to myself on IMAP?

2007-02-19 Thread Nomen Nescio
Robert J. Hansen wrote: > > Maybe you should think things through, or God forbid even run a > > few tests or something before puffing your chest there Robert. > > Especially when you're in the unenviable position of potentialy > > being your own proof of concept. > > I don't know why you have suc