Shaun Lipscombe wrote:
Just wondering (as you do)... as great as it is signing other people's
keys, someones public key does actually reveal quite a lot about the
real world movements and aquaintances of the keyholder as it accumulates
signatories does it not?
The main purpose of Web-of-trust i
Bill Thompson wrote:
Yes, but if you want to remain anonymous what is the point of
cryptographically signing your e-mail?
Guarantee of continuity of particular communication thread
(as opposed to the guarantee of correspondent's identity).
C. Rok
__
Chris De Young wrote:
...that actually writing down passwords, if
they're kept in a secure place, might not be a bad idea...
This is almost certainly the case, especially for passwords
that are used to protect data while 'in transit' on public
networks.
...it seems that copying some arbitrar
Ryan Malayter wrote:
Windows doesn't have whole-disk encryption yet, only per-file and
per-folder encryption.
That said, everything I've read indicates that the encrypting file
system (EFS) in Windows 2000+ is reasonably well implemented.
It is imprudent to trust operating system vendors in g
spam.
Preponderance of e-mail "standards" and "solutions" break in
practice because they are based on a naive premise that the
sender and the receiver of an email message belong to the same
ethnic/language/character-set group.
cdr
___
Gnupg
ating mechanism!
cdr
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Anonymous Sender wrote:
Does anyone know the legal status of GnuPG in China?
In the absence of independent judiciary "legal status"
is a meaningless term.
CDR
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.o
MUS1876 wrote:
I have
friends who currently don't want to use PGP because they fear that
>>their
keys will be uploaded to a keyserver, and then they will be spammed
forever more.
I totally agree what friends of Alphax say.
Wouldn't it be cute to have a sepcial option to flag both keys and
s
et's-all-make-our-own-crypto-software").
cdr
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
some value if one is fighting
with one's employer.
In short, deniability is a valid claim, and can be a useful characteristic
of ciphertext in specific, well-defined instances.
cdr
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
[EMAIL PROTECTED] wrote:
> ...things missing from true-crypt:
...authentication with a key,
TrueCrypt is an encrypted filesystem. No other filesystem that I know
of implements authentication.
cdr
___
Gnupg-users mailing list
Gnupg-users@gnupg.
Use of smatrcards presents a sociological phenomenon, deserving
further research: unexpectedly large number of computer security
practitioners who don't trust closed source crypto on open hardware
but apparently do trust closed source crypto on closed hardware.
Albert Reiner wrote:
P.S.: A slightly less inflammatory tone would not have harmed either.
The tone of "How come King's bum is bare!?" was, no doubt,
considered inflammatory by the Court.
cdr
___
Gnupg-users mailing list
Gnupg-
stem.
or:
b) There is a general acceptance of the fact that the needs of a vast
majority of e-mail users would be adequately served by a simple
symmetric system.
cdr
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
"? Um, sorry, but if that's the case, you _really_
shouldn't have brought up the topic...
Daring statement, prudent skepticism - or something in between.
What difference does it make? Surely that poster is not the only one
looking for alternatives to fact
15 matches
Mail list logo