There's been some discussion both on and off this list about the fact
that people don't use GnuPG (even with Enigmail) because it's 'too
hard'. I have friends that are reasonably intelligent who just can't
figure it out and, for the life of me, I just don't see why.
Don't get me wrong, GnuPG by
For the last few weeks, I've talked about how, when I try to refresh the
keys on my ring, I get an error from GnuPG. Today, I noticed a message
that I hadn't noticed before and I strongly suspect this might be the
cause of the problem I'm having.
When I issued the
gpg2 --refresh-keys
command,
On 11/25/2016 4:02 AM, Stephan Beck wrote:
> Hi Anthony,
>
> Stephan Beck:
>>
>>
>> Anthony Papillion:
>>> Hello Everyone,
>>>
>>> When I run
>>>
>>> gpg2 --keyserver --refresh-keys
>
>>>
>>> Can
On 11/23/2016 3:10 PM, Stephan Beck wrote:
>
>
> Anthony Papillion:
>> Hello Everyone,
>>
>> When I run
>>
>> gpg2 --keyserver --refresh-keys
>>
>> I get a list of all of the keys in my keyring with the message that they
>> have not bee
Hello Everyone,
When I run
gpg2 --keyserver --refresh-keys
I get a list of all of the keys in my keyring with the message that they
have not been changed (this is expected). At the bottom of the output, I
see the following message:
gpg: Total number processed: 31
gpg: unchanged:
On 11/7/2016 2:47 PM, Ralph Seichter wrote:
> On 07.11.16 19:06, Werner Koch wrote:
>
>> Our mailing list admins are moderating posts from non-subscribed
>> posters. For many years they are doing this without getting much
>> attention - time for a big KUDOS to them.
>
> That's quite unusual.
I know Windows 10 sends a lot of telemetry data back to Microsoft for
analysis. The data sent to Microsoft, in some circumstances, also seems
to be keystroke data to help make certain features of Windows 10 better.
How does GnuPG play into this?
Is there any evidence that GnuPG password entry is
On 9/12/2016 2:10 PM, Robert J. Hansen wrote:
>> I understand what S/MIME is and that it's probably the easiest crypto
>> solution for most email users. But why would someone comfortable with
>> GnuPG use it?
>
> There's a subtle point here. The question isn't whether you're comfortable
> with
I understand what S/MIME is and that it's probably the easiest crypto
solution for most email users. But why would someone comfortable with
GnuPG use it? Does it offer any advantages over traditional PGP keys? If
I understand correctly, it's a certificate that much like a SSL
certificate. If
On 9/10/2016 6:04 PM, Claus Assmann wrote:
> On Sat, Sep 10, 2016, Anthony Papillion wrote:
>
>> I send an email to someone using Gmail, how does Gmail route it if the
>> headers are encrypted? Or would the "to" be one of those things not
>
> You might want to r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 9/10/2016 4:00 PM, Robert J. Hansen wrote:
>> I'm confused by this. What does it mean? What does 'armor the
>> mail headers" mean? Is this the same as 'encrypting' the mail
>> headers or does it mean something else?
>
> It means there's a way to
Hi Folks,
In the FAQ on the gnupg.org site there is a discussion about whether
it's acceptable to use PGP/MIME. The FAQ says yes and has the following
statement:
"Almost certainly. In the past this was a controversial question, but
recently there's come to be a consensus: use PGP/MIME whenever
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Are there any current plans to integrate Keybase.io into GnuPG at some
point in the future? In my mind, doing so might present a bit stronger
validation that TOFU and a lot easier use to newbies than the WoT,
which is pretty much useless if the
So I just went to the public bug tracker and was greeted by a page full
of Quickbooks spam! Does the project even maintain the bug tracker
anymore? If not, I'd suggest getting rid of it as that looks /really/ bad!
Anthony
--
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info:
So I just looked and saw that all of the spam in the bug tracker is from
the last hour to hour and a half. Someone probably just hasn't had the
time to clean it up yet. Spoke too soon. My apologies.
Anthony
--
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I just realized that OpenPGP.conf is coming up in less than a month.
Unfortunately, I won't be able to attend. Will anyone be streaming it
live? If not, will there be videos posted?
Thanks,
Anthony
- --
OpenPGP Key:4096R/0x028ADF7453B04B15
Cornelius Kölbel +49 151 2960 1417
>
> NetKnights GmbH Http://NetKnights. It +49 561 3166 797
>
>
> Ursprüngliche Nachricht Von: Anthony Papillion
> <anth...@cajuntechie.org> Datum: 22.08.16 23:22 (GMT+01:00) An:
> gnupg-users@gnupg.org Betreff: OpenP
that I am not in Europe (I'm
in the USA)?
Thanks,
Anthony
On 8/22/2016 7:54 PM, Karol Babioch wrote:
> Hi,
>
> Am 22.08.2016 um 23:22 schrieb Anthony Papillion:
>> I've gone to the kernelconcepts.de page and tried to contact them but
>> it looks like the domain simply
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hello Everyone,
I'm wanting to solidify my key security and I'm just not comfortable
with having my OpenPGP key on my computer all the time. So I'd like to
move to a smartcard solution.
I've gone to the kernelconcepts.de page and tried to contact
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I'm writing a tool that needs to parse output from GnuPG. I'll be
using the --with-colons option to make output easier to parse. Is
there any doc on what the different fields are in the output?
Specifically, for things like --list-public-keys?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/08/2016 10:47 AM, Robert J. Hansen wrote:
>> I'm pretty sure that, if you just send your modified key to the
>> keyserver again, it will replace the one that's there.
>
> This is not correct.
Apparently not. Thanks for the correction. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/08/2016 11:24 AM, Andrew Gallagher wrote:
> On 08/03/16 16:08, Anthony Papillion wrote:
>>
>> I'm pretty sure that, if you just send your modified key to the
>> keyserver again, it will replace the one that's there.
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/08/2016 05:54 AM, Marco A.G.Pinto wrote:
> Hello!
>
> I have made the mistake of adding the same photo with different
> file sizes using Enigmail and export it to the servers.
>
> I have already deleted two of the three photos using the
I recently compiled the latest version of GnuPG 2 from source (.29, I
believe) and, when I tried to use it, was told that I had invalid
options in my .conf file. Specifically, it told me that ZLIB and ZLIB2
weren't supported as compression algos.
Are those two algos no longer supported by GnuPG
ix
this?
Thanks!
Anthony
--
Anthony Papillion
Phone: (918) 533-9699
Skype: CajunTechie
PGP: 0x53B04B15
XMPP" cyp...@chat.cpunk.us
signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gn
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 12/16/2015 2:14 PM, Lachlan Gunn wrote:
> Long story short, there exist algorithms that are hypothesised tho
> be QC-resistant, though as far as I know nothing is proven in that
> respect. Those that do exist, there's still a substantial
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
While I know it's not a big concern at the moment, we are well on the
way to a future that includes quantum computing. While some in the
computer science and crypto fields say we won't see a crypto breaking
quantum computer for another 30+ years,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 12/15/2015 5:07 PM, Andrew Gallagher wrote:
>
>> On 15 Dec 2015, at 22:58, Anthony Papillion
>> <anth...@cajuntechie.org> wrote:
>>
>> I'd like to script encryption and decryption from the command
>> line
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I'd like to script encryption and decryption from the command line. Is
there a way to pass the encryption passphrase to GnuPG from the
command line. For example:
gpg2 --encrypt --recipient --passphrase anth...@cajuntechie.org
SomePassphrase
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hey Everyone,
I'm using PC-BSD 10.2 and I get the message "using insecure memory!"
when I type gpg2 at the terminal. Is this a major issue or is it
something I can (usually) ignore? Is there a way to use "secure" memory?
Thanks,
Anthony
- --
I'll be using are the RSA and AES246 algorithms, is using a
1.4.x implementation that dangerous?
2. Does anyone know of a modern variant of GnuPG that is or could be
made portable?
Thanks,
Anthony
- --
Anthony Papillion
Phone: +1.845.666.3312
Skype: CajunTechie
SIP/VoIP
I
On October 1, 2015 9:38:13 AM CDT, Christian Loehle
wrote:
>I want to use gpg to encrypt a potentially large file to some
>(cloud-like) storage provider, the recipients are not known at the time
>of uploading.
>What I want to do is to send the encrypted session key of
But when I do that, gpg tells it has no key for that address. Why can't
gpg understand and properly process my group line from the terminal? Is
this anything that's planned for the future?
Thanks,
Anthony
--
Anthony Papillion
Phone: 1.918.631.7331
VoIP (SIP): 80...@iptel.org
XMPP Chat: cyp
On 02/21/2015 06:19 PM, Daniel Kahn Gillmor wrote:
On Sat 2015-02-21 18:33:46 -0500, Anthony Papillion wrote:
gpg -ear mygr...@domain.com filename
But when I do that, gpg tells it has no key for that address. Why can't
gpg understand and properly process my group line from the terminal
On 01/14/2015 10:53 PM, Doug Barton wrote:
On 1/14/15 7:09 PM, Anthony Papillion wrote:
gpg: O g: can't encode a 256 bit key in a 0 bit frame
This happens after I tell the program to accept the final key in the
group as valid. But it doesn't seem to be related to a key since I've
the program to accept the final key in the
group as valid. But it doesn't seem to be related to a key since I've
deleted the final key and it still give me the error.
Any idea what might be causing this? Thanks!
Thanks,
Anthony
--
Anthony Papillion
Phone: 1.918.631.7331
XMPP Chat: cyp
On 12/25/2013 06:49 AM, Alice Bob wrote:
I wanted to create an easy to use gui for GnuPG. Without installing,
choosing options, and just working from the get-go.
I appreciate any feedback (and bugs), you can check it at:
https://www.encreep.com
The main use case is for
I know that gnupg is experimenting with ECC and I'm wondering which
curves the team has decided to use. I know there are some curves that
are now suspected of being tainted by the NSA through NIST. Has the
gnupg team ruled using those curves out?
Anthony
--
Anthony Papillion
XMPP/Jabber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Is there a good way to add authentication capabilities to an existing
RSA key? I see how to toggle it if I create a new subkey but not how
to add it to an existing key.
Thanks,
Anthony
- --
Anthony Papillion
XMPP/Jabber: cypherp...@patts.us
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 09/10/2013 05:35 AM, Paul R. Ramer wrote:
Anthony Papillion anth...@cajuntechie.org wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512
Is there a good way to add authentication capabilities to an
existing RSA key? I see how to toggle
. Then, I'll recreate my keys. Looking for a key that will
never be broken is like looking for the fountain of youth: it's a nice
idea but not realistic to plan your life around. Security is always
moving. You have to be prepared to move with it.
Regards,
Anthony
- --
Anthony Papillion
XMPP/Jabber
that, just because the badges check out, you're
completely safe.
Best Regards,
Anthony Papillion
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
and not my preferred way.
Does GPG4Win install anything to the registry that I could check for
to see if it's installed?
Thanks,
Anthony
- --
Anthony Papillion
Phone: 1.918.533.9699
SIP: sip:cajuntec...@iptel.org
XMPP:cypherp...@patts.us
Website: www.cajuntechie.org
PGP Key: 0x53B04B15
Hello Everyone,
I meed to generate a new key and want to make sure I create enough
entropy to make the key secure. My normal method is to type on the
keyboard, start large programs, etc. But a friend suggested that I use
/dev/random.
Is this suitable for creating a PGP key? I've got concerns.
On 6/17/2012 7:10 AM, Werner Koch wrote:
On Sat, 16 Jun 2012 22:42, papill...@gmail.com said:
For some reason, every time I do anything to an encrypted message, I
have to re-enter my passphrase. If I open a message, I enter my
passphrase, then, when I reply to it, I have to enter it again.
Hey Everyone,
Just tried to fetch the source using
git clone git://git.gnupg.org/gnupg.git
and my connection was refused.
Is the server down?
Thanks!
Anthony
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hello Everyone,
I'm having a devil of a time with Ubuntu 11.04 with GnuPG and need a bit
of help. This MIGHT be a problem with the Enigmail plugin but I think
it's probably something to do with my GnuPG configuration so I'm asking
here first.
On 06/16/2012 05:37 PM, da...@gbenet.com wrote:
On 16/06/12 21:42, Anthony Papillion wrote:
Hello Everyone,
Can anyone lend me a hand and help me figure this out? I've even
gone as far as to rename the gpg2 binary so it couldn't be found
by the system, renamed the gpa.conf file (just
Original Message
Subject: Re: Question about key fingerprint uses
From: Peter Lebbing pe...@digitalbrains.com
Date: Fri, April 27, 2012 5:40 am
To: Anthony Papillion anth...@papillion.me
You're turning it around :). Rather than verify you are speaking to John using
his
? Please feel free to point me to the right place in code if
need be.
Thanks!
Anthony
--
Anthony Papillion
Software Developer and IT Consultant
Phone: (918) 533-9699
My Twitter: twitter.com/cajuntechie
My Facebook: facebook.com/cajuntechie
My Identica: identi.ca/cajuntechie
So I was browsing the documentation this morning when I came across this
documentation for the --fingerprint flag:
You want to see Fingerprints to ensure that somebody is really the
person they claim (like in a telephone call). This command will result
in a list of relatively small numbers.
I'm
On Mon, Jan 30, 2012 at 3:12 PM, Belleraphone cco...@gmail.com wrote:
I realize that, but how do I make it so that my files are fit to be
clearsigned? I was given a bunch of information from a website that said
what needed to be clearsigned. How do I put this information into a file
that
On Mon, Oct 17, 2011 at 4:44 PM, Jerome Baum jer...@jeromebaum.com wrote:
Your private key being stolen isn't really that big of a deal. If you
have a very strong passphrase, possessing your private key gives an
attacker almost no leverage. With a strong passphrase, the average
attacker isn't
On Mon, Oct 17, 2011 at 4:44 PM, Jerome Baum jer...@jeromebaum.com wrote:
Your private key being stolen isn't really that big of a deal. If you
have a very strong passphrase, possessing your private key gives an
attacker almost no leverage. With a strong passphrase, the average
attacker isn't
On Mon, Oct 17, 2011 at 4:18 PM, takethe...@gmx.de wrote:
what is the best way to protect
your private key from getting stolen?
Your private key being stolen isn't really that big of a deal. If you
have a very strong passphrase, possessing your private key gives an
attacker almost no
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 8/26/2011 10:25 AM, Aaron Toponce wrote:
Oh, you can own an encrypted filesystem, even if the box is down. The
Evil Maid attack makes this trivial. And it doesn't matter the
encryption software used either.
I read about this attack a few
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
So in the course of another discussion on this group, I was told that I
might not actually need my 160+ random character passphrase for good
security. A few URL's were included, including this one
On 08/23/2011 02:04 AM, Werner Koch wrote:
On Tue, 23 Aug 2011 03:47, papill...@gmail.com said:
Spying on X windows is pretty easy and thus Pinentry tries to make it
harder.
Werner,
Since I've never used Pinentry, I'm obviously missing something here.
While I'm aware that spying on X-Window
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
So I'm currently running 1.4.10 for GNU/Linux even though I know that
2.0 has been out for a while. I chose to stick with 1.4.10 and 1.4.11
because I don't like having to use pinentry since it doesn't support cut
and paste. My questions are these:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/22/2011 07:01 AM, Werner Koch wrote:
On Mon, 22 Aug 2011 10:29, papill...@gmail.com said:
because I don't like having to use pinentry since it doesn't support cut
and paste. My questions are these:
That is on purpose. If you have your
slightly.
Besides proving a point, why would you publish?
--
Jerome Baum
tel +49-1578-8434336
email jer...@jeromebaum.com
--
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
--
Sent from my mobile device
Anthony Papillion
Lead
@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
Anthony Papillion
Lead Developer / Owner
Get real about your software/web development and IT Services
(918) 919-4624
Facebook: http://www.facebook.com/cajuntechie
My Blog: http://www.cajuntechie.com
other method to populate an existing gpg-agent with a cached passphrase?
--
Sent from my mobile device
Anthony Papillion
Lead Developer / Owner
Get real about your software/web development and IT Services
(918) 919-4624
Facebook: http://www.facebook.com/cajuntechie
My Blog: http
On 10/28/2010 09:14 AM, Thomas Lecavelier wrote:
Hi,
I tried many times to use GPG on a day-to-day basis. It often starts very
well: I sign every mail I sent, evangelis people asking about my strange
signatures, etc. But there's a fact: I'm a computer scientist worker, so I
work on
or directory
gpg: no handler for keyserver scheme `hkp'
gpg: keyserver send failed: keyserver error
I am using the latest version of GPG (downloaded from the site) and I
KNOW this works on Linux.
Can anyone help?
Thanks!
Anthony Papillion
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32
I'm running Windows XP Professional with SP3.
On 10/20/10, Faramir faramir...@gmail.com wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
El 20-10-2010 14:36, Anthony Papillion escribió:
Hello Everyone,
I'm a new member of the list but I've been using GPG for a bit now on
Linux. I
66 matches
Mail list logo