Filesystem Encrytion with GnuPG ?!

2005-05-26 Thread Markus Breitländer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey, is it possible to use GnuPG for filesystem encryption? I am thinking about having a directory tree o your hard disk that is encrypted using GnuPG PKI - only accessible with once secret-key + mantra. Are there solutions like that for Windows? I

Re: Minnesota court takes dim view of encryption

2005-05-26 Thread Erpo
On Wed, 2005-05-25 at 16:11 -0500, Shatadal wrote: From http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent. That bit

Re: Minnesota court takes dim view of encryption

2005-05-26 Thread Henry Hertz Hobbit
--- Shatadal [EMAIL PROTECTED] wrote: From http://news.com.com/Minnesota+court+takes+dim+view+of +encryption/2100-1030_3-5718978.html A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent. Then I must be

Re: KMail and smartcard - what is a stub secret key ?

2005-05-26 Thread gpg . 20 . subu
Hi I'm new here Sorry to butt in For gpg it makes no difference whether the key is on the disk or on the card. This is because we create a stub- secret key for every card key. gpg -K will show you the serial number of the cards associated with that secret key. what is a stub secret key

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Michael B. Trausch
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Sean C. wrote: I'm confused though. I just read this article from the New York Times. As a newbie to encryption and hash algorithms I thought the idea behind hashes was that you couldn't reconstruct the data from the hash. You can't,

Re: Feature request: Add date and time to filename of encrypted file

2005-05-26 Thread Henry Hertz Hobbit
On Tue, 2005-05-24 at 21:07 +0930, Roscoe wrote: Hmmm, out of curiosity did you intend to send that to the list? Nope. And although I am sending this one to the list, it is for PRIVATE distribution and discussion only. I don't think it is of general interest. Then again, I could be wrong...it

RC2

2005-05-26 Thread Alexander Hoffmann
Hi Johan, you may be right. I tried it with ./configure --enable-ciphers=aes,...,rfc2268 und after that found in Makefile rfc2268 among the algorithms to be compiled, but after installation rfc2268 is still missed in output libgcrypt-config --algorithms Johan Wevers wrote: Alexander Hoffmann

RE: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Ryan Malayter
[Alex L. Mauer] Can you expand on this? How could the Name/address/ssn be retrieved from a hash of the same? The data can be recovered from the hash because search space is small. Say you are looking for the SSN of a John Smith. Every large DB is bound to have someone named John Smith.

Re: Filesystem Encrytion with GnuPG ?!

2005-05-26 Thread Atom Smasher
speaking of encrypted file-systems, does anyone know what happened to rubberhose.org? -- ...atom _ PGP key - http://atom.smasher.org/pgp.txt 762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808 -

Choice of Algorithm

2005-05-26 Thread Youssef Aoun
Hello everyone, How should I choose an algorithm for my key. Since ElGamal is able to make signatures and encryption... why do we have other alternatives? Does it help to have multiple key?? Sincerely yours Youssef Aoun ___ Gnupg-users mailing list

PGP 8.1 message

2005-05-26 Thread Sohail Mamdani
Hello, I am having some problems with messages and keys created/encrypted using PGP 8.1. I was, for example, sent a public key block exported from PGP 8.1 and gnupg refused to import that key into my keyring, giving me the message gpg: no valid OpenPGP data found. I had to install PGP 9.0, import

Re: IBM to Provide Security w/o Sacrificing Privacy Using Hash Functions

2005-05-26 Thread Alex Mauer
Mark H. Wood wrote: The whole point of using a hash is to make it extremely unlikely that either party could recover the plaintext unilaterally. It's like having a vault with two different locks, and giving the keys to two different people, to make abuse more difficult by requiring collusion

Re: Additional self-signature

2005-05-26 Thread Oskar L.
Werner wrote: When importing a secret key into a keyring without a public key, a public key is created from the secret key. Due to historic reasons the self-signature on the secret key is a different one than the one created with the public key. How when importing the public key a new

Re: Additional self-signature

2005-05-26 Thread David Shaw
On Fri, May 27, 2005 at 02:07:27AM +0300, Oskar L. wrote: Werner wrote: When importing a secret key into a keyring without a public key, a public key is created from the secret key. Due to historic reasons the self-signature on the secret key is a different one than the one created with