Hi,
Unfortunately I have a new problem!
I have changed my towitoko cardreader with an usb version of reiner
cyberjack.
Installed the drivers from gentoo.
gpg is at version 2.0.14
User added to cyberjack group.
The testprrogramm cyberjack reports no errors.
pcscd is running as well.
gpg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Daniel Kahn Gillmor escribió:
On 05/09/2010 05:10 PM, Faramir wrote:
But comments field is for comments, not for identity information, so I
don't see any problem in adding a hint so people can know which key
should I use?.
OK, but how many
On Wednesday 12 May 2010 02:49:43 Grant Olson wrote:
I think the semantics and correct behavior become unclear when one of
the keys is revoked.
- Alice has two encryption keys.
- Bob sends to both keys.
- Alice revokes one key.
- Bob doesn't refresh his keys. Continues sending to
On Wednesday 12 May 2010 02:49:43 Grant Olson wrote:
So now Alice doesn't even realize that Bob is still sending sensitive
info on a potentially compromised key.
You might be able to put a weird exception where gpg checks to see if
any of your private keys that are revoked are one of the
Hello,
do you think it would be useful to integrate some information about the usage
security of a key into the key?
Keys are used differently. The one I use to sign this email is my key for
nearly everything. It is (or rather: was) stored on several PCs which are
rather comfortable than high
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 12 May 2010 at 10:11:24 AM, in
mid:4bea70bc.40...@gmail.com, Faramir wrote:
No, the comment could be useful in case somebody had
the first (now orphan) key, and now he has found the
new key and wants to know which one should
On 05/12/2010 11:31 AM, Hauke Laging wrote:
do you think it would be useful to integrate some information about the
usage
security of a key into the key?
snip
Of course, it is not a problem to generate several keys for different levels
of security. I would not want this key to be accepted
On 05/12/2010 02:06 PM, MFPA wrote:
Although the comment could just state it was his new key from
dd/mm/ without mentioning any other key(s).
even this comment would be superfluous, since the key has a Created on
timestamp built in. Also, his statement isn't really part of a person's
Am Mittwoch 12 Mai 2010 20:29:18 schrieb Joel C. Salomon:
I generate two keys, one low-security (e.g., “Joel Salomon webmail”) and
one high-security (“Joel Salomon smartcard”). I sign the low-security
key with my high security key, but I don’t ask others to sign it; the
only key I put into