Hi,
What is the standard that the GPG armor key is compliant with
? X.501 ?
Thanks,
Mohan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Dec 8, 2010, at 8:01 AM, Mohan Radhakrishnan wrote:
Hi,
What is the standard that the GPG armor key is compliant with ?
X.501 ?
RFC-4880 (http://tools.ietf.org/html/rfc4880). See section 6 in particular for
how the armor is formed, and sections 4 and 11 for what goes into the
On 12/8/10 3:20 PM, Hank Ivy wrote:
What should I take? How should I organize, and protect the IDs?
For me, I bring a passport and a driver's license. If anyone tells me
that's not enough for me!, well, okay: it's not enough for them.
There are plenty of other people at the keysigning party,
On Dec 8, 2010, at 3:20 PM, Hank Ivy wrote:
I moved to a small town in a new state for personal reasons. For work I
telecommuted as an
independent consultant. A computer user group I joined recently is going to
be holding a key
signing party. NOBODY has met me more than three times,
On Wed, Dec 8, 2010 at 15:20, Hank Ivy hank...@hot.rr.com wrote:
What should I take? How should I organize, and protect the IDs?
Take two. A driver's license and a passport would be best, though one
probably authenticated you for the other. To protect them, put them
in your wallet or pocket.
Am Mittwoch 08 Dezember 2010 22:54:02 schrieb Robert J. Hansen:
For me, I bring a passport and a driver's license. If anyone tells me
that's not enough for me!, well, okay: it's not enough for them.
That should not be a question of personal attitude but of the signing policy
for the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
El 07-12-2010 16:32, David Shaw escribió:
On Dec 7, 2010, at 11:56 AM, Chris Poole wrote:
Why not just store the GPG encrypted file directly with the strong
passphrase that I know ?
I'm happy to do that, I'm just trying to keep the very
Hello,
I am giving very serious thought to creating new keys and
doing a (long-term) transition to them. This is partly to respond to
known flaws with SHA-1 and take advantage of SHA-256 and higher.
There is currently a push to move away from SHA-1 usage by the end of
2010, although it