gpg and reiner cyberjack cardreader

2010-05-12 Thread Halim Sahin
Hi, Unfortunately I have a new problem! I have changed my towitoko cardreader with an usb version of reiner cyberjack. Installed the drivers from gentoo. gpg is at version 2.0.14 User added to cyberjack group. The testprrogramm cyberjack reports no errors. pcscd is running as well. gpg

Re: Help me to import my secret key please

2010-05-12 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Daniel Kahn Gillmor escribió: On 05/09/2010 05:10 PM, Faramir wrote: But comments field is for comments, not for identity information, so I don't see any problem in adding a hint so people can know which key should I use?. OK, but how many

Re: Encryption to key with multiple subkeys

2010-05-12 Thread Joke de Buhr
On Wednesday 12 May 2010 02:49:43 Grant Olson wrote: I think the semantics and correct behavior become unclear when one of the keys is revoked. - Alice has two encryption keys. - Bob sends to both keys. - Alice revokes one key. - Bob doesn't refresh his keys. Continues sending to

Re: Encryption to key with multiple subkeys

2010-05-12 Thread Joke de Buhr
On Wednesday 12 May 2010 02:49:43 Grant Olson wrote: So now Alice doesn't even realize that Bob is still sending sensitive info on a potentially compromised key. You might be able to put a weird exception where gpg checks to see if any of your private keys that are revoked are one of the

published key security levels

2010-05-12 Thread Hauke Laging
Hello, do you think it would be useful to integrate some information about the usage security of a key into the key? Keys are used differently. The one I use to sign this email is my key for nearly everything. It is (or rather: was) stored on several PCs which are rather comfortable than high

Re: Help me to import my secret key please

2010-05-12 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 12 May 2010 at 10:11:24 AM, in mid:4bea70bc.40...@gmail.com, Faramir wrote: No, the comment could be useful in case somebody had the first (now orphan) key, and now he has found the new key and wants to know which one should

Re: published key security levels

2010-05-12 Thread Joel C. Salomon
On 05/12/2010 11:31 AM, Hauke Laging wrote: do you think it would be useful to integrate some information about the usage security of a key into the key? snip Of course, it is not a problem to generate several keys for different levels of security. I would not want this key to be accepted

Re: Help me to import my secret key please

2010-05-12 Thread Daniel Kahn Gillmor
On 05/12/2010 02:06 PM, MFPA wrote: Although the comment could just state it was his new key from dd/mm/ without mentioning any other key(s). even this comment would be superfluous, since the key has a Created on timestamp built in. Also, his statement isn't really part of a person's

Re: published key security levels

2010-05-12 Thread Hauke Laging
Am Mittwoch 12 Mai 2010 20:29:18 schrieb Joel C. Salomon: I generate two keys, one low-security (e.g., “Joel Salomon webmail”) and one high-security (“Joel Salomon smartcard”). I sign the low-security key with my high security key, but I don’t ask others to sign it; the only key I put into