On 01-03-2015 22:01, flapflap wrote:
Just think about the grandchild trick ([0], unfortunately not in
English) which is a method where the criminals phone (often elder)
people and tell them that they are a grandchild, nephew, or other remote
relative and need some money for some reason
Ah
On 01-03-2015 13:27, Jonathan Schleifer wrote:
You are assuming it will be spoofed for everyone. It could just
be spoofed for you. Anybody who can MITM you and give you a fake
SSL cert that you accept
Well, perhaps they could if the ONLY way I communicated wit someone
would be electronically.
This month's Wired has an article about encryption for voice and text using
pgp, and intercompatibility between i-phone and android while using it.
http://www.wired.com/2015/03/iphone-app-encrypted-voice-texts/
I wouldn't trust it with my real key, but would make a new 'smartphone' key
signed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Monday 2 March 2015 at 9:40:12 AM, in
mid:20150302104012.99d46e72ccd25b0871994...@webkeks.org, Jonathan
Schleifer wrote:
It's not only your computer.
Likewise, it is not just my computer that would be wasting orders of
magnitude more energy
On 02-03-2015 22:23, ved...@nym.hush.com wrote:
http://www.wired.com/2015/03/iphone-app-encrypted-voice-texts/
I wouldn't trust it with my real key, but would make a new
'smartphone' key signed with my real key, and comment it as
for phone use only.
You can't, it uses an own key scheme not
On Mon, 02 Mar 2015 22:24:45 +0100, Johan Wevers joh...@vulcan.xs4all.nl
wrote:
For once, I've never heard of the police
trying something like this to obtain confessions or information: the
chance of failure in an indivicual case are too big.
I'm guessing the reason is more that this would
Hi Neal,
On Saturday 28 February 2015 at 12:27:05, Neal H. Walfield wrote:
http://wiki.gnupg.org/LDAPKeyserver
and while you were at it, you have also went through a number of wiki pages
correcting and improving the format and language!
Thanks and welcome to the club of wiki.gnupg.org
On Sun, 1 Mar 2015 23:43, js-gnupg-us...@webkeks.org said:
I don't really agree with that. The goal is that the proof of work for a
single message takes 4 minutes. At that rate, sending spam really is not
So you can send 360 mail a day. Assuming your 24/7 business make 700
Euro a day each
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/02/2015 04:50 AM, Chuck Peters wrote:
Kristian Fiskerstrand said:
You wouldn't need the keyservers to be involved in this at
all. Anyone could set up such a mail verification CA outside
of the keyserver network.
How about storing keys
Hello,
On Behalf Of Patrick Brunschwig
Sent: Sunday, March 01, 2015 3:42 PM
The idea I have in mind is roughly as follows: if you upload a key to
a keyserver, the keyserver would send an encrypted email to every UID
in the key. Each encrypted mail contains a unique link to confirm the
email
Am 28.02.2015 um 13:31 schrieb Peter Lebbing:
PS: By the way, my ISP and some of it's employees are in a perfect position to
do a man in the middle.
No doubt about it. And we actually don't know how they use their position.
Well, looking at some sort of collaboration published a few weeks
On Sunday 01 March 2015 at 20:11:10, Werner Koch wrote:
was a bug report for the patch? I would gladly write one if that would
Well written bug reports are always appreciated.
I believe the main thing that Werner is mentioning here is that
analysis of an unwanted situation and a fix are two
At Mon, 2 Mar 2015 12:35:30 +0100,
Bernhard Reiter wrote:
On Saturday 28 February 2015 at 12:27:05, Neal H. Walfield wrote:
http://wiki.gnupg.org/LDAPKeyserver
and while you were at it, you have also went through a number of wiki pages
correcting and improving the format and language!
Il 01/03/2015 21:54, Peter Lebbing ha scritto:
No, I'm talking about that as well. And I don't think the fingerprint of
the host is part of the signed data or the signature. Why do you think the
fingerprint of the host is part of that?
Because I didn't remember well the SSH protocol...
By
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sunday 1 March 2015 at 6:58:19 PM, in
mid:bd57b3db-6d9f-4189-93de-ec7351dd8...@webkeks.org, Jonathan
Schleifer wrote:
That wasted energy is a lot less than the energy we
currently waste on spam,
I suspect my computer wastes very little
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sunday 1 March 2015 at 10:43:25 PM, in
mid:fea9b942-612b-4e6a-b065-c2c280227...@webkeks.org, Jonathan
Schleifer wrote:
The goal is that the
proof of work for a single message takes 4 minutes.
Currently at work, when I ask somebody a
On Mon, 02 Mar 2015 00:34:55 +0100 Daniel Kahn Gillmor wrote:
On Sun 2015-03-01 20:01:05 +0100, Werner Koch wrote:
On Sun, 1 Mar 2015 15:32, rp...@kcore.de said:
is there a command line utility that takes a PGP/MIME encrypted
message (a plain RFC 2822 text file) and outputs an
On 02/03/15 11:35, Stephan Beck wrote:
Sticking to that perfect position argument, in what kind of position are
(would be) the people that control (packaging of) your distro? (Just
curious.)
I think they basically completely control my system. For individual Debian
Developers, it might need
Hello,
I am Deepak Saxena from Gemalto (formerly SafeNet Inc) and I am curious if
smart cards are supported for storing the keys which will be used to encrypt
files or email using gpg4win.
I have installed gpg4win 2.2.3 and want to test SafeNet smart cards.
I am getting following error:
19 matches
Mail list logo