-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey,
is it possible to use GnuPG for filesystem encryption?
I am thinking about having a directory tree o your hard disk that is
encrypted using GnuPG PKI - only accessible with once secret-key + mantra.
Are there solutions like that for Windows? I
On Wed, 2005-05-25 at 16:11 -0500, Shatadal wrote:
From
http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html
A Minnesota appeals court has ruled that the presence of encryption
software on a computer may be viewed as evidence of criminal intent.
That bit
--- Shatadal [EMAIL PROTECTED] wrote:
From
http://news.com.com/Minnesota+court+takes+dim+view+of
+encryption/2100-1030_3-5718978.html
A Minnesota appeals court has ruled that the
presence of encryption software on a computer may be
viewed as evidence of criminal intent.
Then I must be
Hi
I'm new here
Sorry to butt in
For gpg it makes no difference whether the key is on the disk or on
the card. This is because we create a stub- secret key for every
card key. gpg -K will show you the serial number of the cards
associated with that secret key.
what is a stub secret key
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Sean C. wrote:
I'm confused though.
I just read this article from the New York Times. As a newbie to encryption
and
hash algorithms I thought the idea behind hashes was that you couldn't
reconstruct the data from the hash.
You can't,
On Tue, 2005-05-24 at 21:07 +0930, Roscoe wrote:
Hmmm, out of curiosity did you intend to send that to the list?
Nope. And although I am sending this one to the list, it is for
PRIVATE distribution and discussion only. I don't think it is of
general interest. Then again, I could be wrong...it
Hi Johan,
you may be right. I tried it with ./configure
--enable-ciphers=aes,...,rfc2268 und after that found in Makefile
rfc2268 among the algorithms to be compiled, but after installation
rfc2268 is still missed in output libgcrypt-config --algorithms
Johan Wevers wrote:
Alexander Hoffmann
[Alex L. Mauer]
Can you expand on this?
How could the Name/address/ssn be retrieved from a hash of the same?
The data can be recovered from the hash because search space is small.
Say you are looking for the SSN of a John Smith. Every large DB is bound
to have someone named John Smith.
speaking of encrypted file-systems, does anyone know what happened to
rubberhose.org?
--
...atom
_
PGP key - http://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
-
Hello everyone,
How should I choose an algorithm for my key.
Since ElGamal is able to make signatures and encryption... why do we
have other alternatives?
Does it help to have multiple key??
Sincerely yours
Youssef Aoun
___
Gnupg-users mailing list
Hello,
I am having some problems with messages and keys created/encrypted
using PGP 8.1. I was, for example, sent a public key block exported
from PGP 8.1 and gnupg refused to import that key into my keyring,
giving me the message gpg: no valid OpenPGP data found. I had to
install PGP 9.0, import
Mark H. Wood wrote:
The whole point of using a hash is to make it extremely unlikely that
either party could recover the plaintext unilaterally. It's like having a
vault with two different locks, and giving the keys to two different
people, to make abuse more difficult by requiring collusion
Werner wrote:
When importing a secret key into a keyring without a public key, a
public key is created from the secret key. Due to historic reasons
the self-signature on the secret key is a different one than the one
created with the public key. How when importing the public key a new
On Fri, May 27, 2005 at 02:07:27AM +0300, Oskar L. wrote:
Werner wrote:
When importing a secret key into a keyring without a public key, a
public key is created from the secret key. Due to historic reasons
the self-signature on the secret key is a different one than the one
created with
14 matches
Mail list logo