Re: gpg - difference --encrypt-to and --recipient

2019-01-02 Thread vedaal via Gnupg-users
On 1/2/2019 at 3:59 PM, "justina colmena via Gnupg-users" wrote: >My opinion is that should be the case. However, most MUAs I've used >include the BCC recipients' keys in the encryption along with the To >and CC recipients' keys, so any email addresses in the user-IDs of >these keys are visible

Re: gpg - difference --encrypt-to and --recipient

2019-01-02 Thread Stefan Claas
On Wed, 02 Jan 2019 11:56:27 -0900, justina colmena via Gnupg-users wrote: > On January 1, 2019 4:13:43 PM AKST, MFPA > <2017-r3sgs86x8e-lists-gro...@riseup.net> wrote: > >With hidden-recipient or hidden-encrypt-to or throw-keyids, it is > >clear how many keys were encrypted to, but the key IDs

Re: gpg - difference --encrypt-to and --recipient

2019-01-02 Thread justina colmena via Gnupg-users
On January 1, 2019 4:13:43 PM AKST, MFPA <2017-r3sgs86x8e-lists-gro...@riseup.net> wrote: >Hi > > >On Monday 31 December 2018 at 9:06:39 PM, in >, justina >colmena via Gnupg-users wrote:- > > >> Shouldn't an email message (for example) be encrypted >> separately to >> each BCC recipient, > >My

Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-02 Thread Matthias Apitz
El día miércoles, enero 02, 2019 a las 11:36:54a. m. +0100, Werner Koch escribió: > On Tue, 1 Jan 2019 08:36, g...@unixarea.de said: > > > with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card Reader) after > > Take care: Usual Omnikey problems with creating and using large keys > apply.

Re: A question about WKD

2019-01-02 Thread Stefan Claas
On Wed, 2 Jan 2019 11:18:25 +0100, Wiktor Kwapisiewicz wrote: Hi Wiktor, > Revoke your current key locally and generate a new one, now export both binary > keys (that includes revocation) to a file. Place it in > .well-known/openpgpkey/hu > overwriting the old file. > > Now, when GnuPG does

Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-02 Thread Alexander Paetzelt | Nitrokey
Hi, On 01.01.19 08:36, Matthias Apitz wrote: > How can I meanwhile 'reset' the OpenPGP card so that on next request for > the secrets (decrypt, signing, ssh) the PIN is requested? for key slots 1 and 2 there probably is no way to do this other than unplugging und replugging the device. See also

Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-02 Thread Werner Koch
On Tue, 1 Jan 2019 08:36, g...@unixarea.de said: > with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card Reader) after Take care: Usual Omnikey problems with creating and using large keys apply. > How can I meanwhile 'reset' the OpenPGP card so that on next request for > the secrets

Re: A question about WKD

2019-01-02 Thread Wiktor Kwapisiewicz via Gnupg-users
On 01.01.2019 13:19, Stefan Claas wrote: > Hi Wiktor and all, > > since my current WKD key is a temporary key i would like to know > for best practice the following: > > In a couple of days i will receive my Kanguru Defender 3000 USB stick > and then i will create a new key pair and put it on

Re: NIST 800-57 compatible unattended encryption?

2019-01-02 Thread Wiktor Kwapisiewicz via Gnupg-users
Hello, > On Wed, Jan 02, 2019 at 04:02:03PM +1100, gn...@raf.org wrote: >> For some dumb reason I think I was hoping that the RSA >> algorithm wasn't really used to encrypt all the data. I >> thought it was probably used to encrypt a per-file >> randomly-generated symmetric key which was then

Re: NIST 800-57 compatible unattended encryption?

2019-01-02 Thread Damien Goutte-Gattat via Gnupg-users
Hi, On Wed, Jan 02, 2019 at 04:02:03PM +1100, gn...@raf.org wrote: > For some dumb reason I think I was hoping that the RSA > algorithm wasn't really used to encrypt all the data. I > thought it was probably used to encrypt a per-file > randomly-generated symmetric key which was then used to >