the wrong reaction. Instead, people using
such a MUA should be educated to use another MUA. PGP implementations have undergone
changes which were much more "breaking" than encrypted subject lines.
Best regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
es his normal
work (because the management as usual does not understand the importance
and value of such work and the expertise and time which is needed).
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
gmail such successful (and GnuPG,
or course).
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
nstallation directory (under Windows, probably a
DLL) and for sure could be updated via TB's update system.
Just my 2 cents ...
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
able
time.
Not wanting to make users install additional software isn't a reasonable
argument for re-inventing the wheel, because AFAIK nothing prevents
people from bundling GnuPG with TB in the same installer, and I bet that
even installing these two packages into the same directory and letting
them u
On 14.10.2019 09:17, Patrick Brunschwig wrote:
> Binarus wrote on 13.10.2019 18:27:
> [...]
>> 1) The schedule
>>
>> We have all been educated to update our applications (notably, "internet
>> applications" like browser and email clients) as so
they want in their normal email account, but all
messages which are ever sent or received must first be copied somewhere
where they cannot be manipulated or deleted.
I can't imagine how this could be achieved when using those services.
These are only a few of the many reasons against using a purely
cl
On 13.10.2019 18:51, Werner Koch wrote:
> On Sun, 13 Oct 2019 18:27, Binarus said:
>
>> keys' IDs were formally wrong so that key servers didn't accept the
>> keys. The easiest possible solution was to re-generate these keys using
>
> For the records: Not /keys
sage
also is one of the essential features (thanks, Patrick, and thanks,
Werner, that you finally have made this possible a while ago!) ...
Just my 2 cents ...
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 19.09.2019 12:31, Stefan Claas via Gnupg-users wrote:
> Binarus wrote:
>
>> IMHO, this system lacks a mandatory unique token in the key ID. The
>> natural choice for such a token would be the email address, because in
>> the first place it is the only thing you kn
On 18.09.2019 17:30, Stefan Claas via Gnupg-users wrote:
> Binarus wrote:
>
>> You have stated that my real name must be in the key ID if I would like
>> to have the key certified by Governikus. Does the key ID need to have
>> other personal data in it? After all, as an
On 17.09.2019 21:58, Stefan Claas via Gnupg-users wrote:
> Binarus wrote:
>
>> Actually, I currently don't know anybody who I could ask to sign my
>> keys, and furthermore, the problem is bigger the other way around. Can I
>> trust the key which I found on the key
his
addr can be found nevertheless on the key server. Therefore, we need to
structure the ID so that there is one dedicated place where addrs can be
stored and easily parsed, which again means to disallow them in normal
free text.
Just my two cents
Glad
that I noticed this just in time - I already was typing "Does anybody
know how widespread those proposals are, and which one has won?" :-)
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
encrypt a message hash
with your private key, the receiver decrypts the hash using your public
key and checks if the decrypted hash matches the message). So deleting
public keys from a key server might be a bad idea anyway.
Regards,
Binarus
___
Gnupg-users m
am happy now, as long as IDs consisting only of the
actual mail address remain allowed. Personally, I currently don't need
to have my name or other fancy text in my keys' IDs. I suppose that
somebody who wants to write me an encrypted message will search for my
public key at first by email add
On 16.09.2019 12:58, Claus Assmann wrote:
> On Mon, Sep 16, 2019, Binarus wrote:
>
>> Surname, Forename | Company
>
>> Commas are not allowed as part of email addresses. While I knew that, I
>
> unless quoted, e.g.,
> "Surname, Forename | Company"
On 14.09.2019 13:15, Binarus wrote:
> I have used the Thunderbird / Enigmail / Gpg4Win troika for quite a
> while without any issue. Yesterday, I had to reinstall, and while doing
> so, upgraded to the newest versions of that packages, and while I was at
> it, revoked my old (10
thank you very much for your support and time.
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
encryption works in general, but I
never (until now) have used GPG's command line interface (just hadn't to
do so because Enigmail did its job quite good), so it would be nice if
the issue could be explained in simple words :-)
Thank you very much in advance,
Binarus
P.S. If it would help, I
their PIN for a UK bank
> account (it IS as random a selection as any other 4-digit number).
Yes, in a mathematical sense. Taking the human factor into account, that person
has been very unlucky.
If you are interested in the details, please refer to my post from 2017-07-12
On 15.07.2017 16:40, MFPA wrote:
>
>
> On Thursday 13 July 2017 at 7:18:41 AM, in
> <mid:3e405e1d-507d-255a-b5db-8aa700d43...@binarus.de>, Binarus wrote:-
>
>
>> I don't think so. Banking chip cards contain
>> mechanisms for local PIN
>> verifica
On 15.07.2017 12:36, MFPA wrote:
>
>
> On Wednesday 12 July 2017 at 11:01:35 AM, in
> <mid:36bf468a-5752-745d-3ea8-6c80c98c0...@binarus.de>, Binarus wrote:-
>
>
>> As far as I know, no bank will be able to tell you
>> your PIN if you have
>> forgott
On 13.07.2017 01:19, MFPA wrote:
>
>
> On Wednesday 12 July 2017 at 6:51:42 AM, in
> <mid:109b00fe-7524-69e7-a3cd-94156eef7...@binarus.de>, Binarus wrote:-
>
>
>> and this means that such software would
>> have to run on the
>> card.
>
> O
On 13.07.2017 01:23, MFPA wrote:
>
>
> On Wednesday 12 July 2017 at 3:15:09 PM, in
> <mid:3a6ef797-5e26-7b2c-d740-ee85d9750...@binarus.de>, Binarus wrote:-
>
>
>
>> (if the
>> PIN needs to be
>> stored at all in some backend which I doubt
On 12.07.2017 12:10, Peter Lebbing wrote:
> On 12/07/17 07:51, Binarus wrote:
>> Furthermore (not being sure, so read with care), I think that the bank
>> does not know your pin
>
> When my bank card is replaced because its validity is about to end, the
> new card has the
On 12.07.2017 12:27, NdK wrote:
> Il 12/07/2017 12:01, Binarus ha scritto:
>
>> Not sure about that. Similar to serious websites which don't store your
>> password in clear text, but do store the password's hash instead, I
>> would expect that banks don't store your P
On 12.07.2017 11:42, Guan Xin wrote:
> On Wed, Jul 12, 2017 at 1:51 PM, Binarus <li...@binarus.de
> <mailto:li...@binarus.de>> wrote:
>
> On 11.07.2017 20:38, MFPA wrote:
> >
> >
> > On Tuesday 11 July 2017 at 8:44:48 AM, in
>
name sounds German):
http://www.sueddeutsche.de/wissen/unsichere-pin-codes-erwischt-1.1486312
I don't have time for a thorough research right now, but this article
gives us an idea. I don't think the situation has changed much since
2012 ...
Regards,
Binarus
___
On 11.07.2017 20:38, MFPA wrote:
>
>
> On Tuesday 11 July 2017 at 8:44:48 AM, in
> <mid:3499376d-11fb-9854-688a-48e054166...@binarus.de>, Binarus wrote:-
>
>
>> I am not sure if this is an intentional limitation of
>> the cards (to
>> prevent
On 11.07.2017 14:38, Jerry wrote:
> On Tue, 11 Jul 2017 12:32:56 +0200, Binarus stated:
>
> [...]
>> I am not completely sure if I got you right. Wouldn't that mean that I
>> have to lose my card, the bad person then makes two guesses, then I get
>> back my card and e
On 11.07.2017 11:48, Matthias Mansfeld wrote:
> On 11 Jul 2017 at 9:44, Binarus wrote:
>
>> On 10.07.2017 17:42, Guan Xin wrote:
>>> This is probably a general question --
>>>
>>> I have never seen a German bank that allows changing the PIN of a card.
>&g
On 11.07.2017 14:32, NdK wrote:
> Il 11/07/2017 12:32, Binarus ha scritto:
>
>> But now, being a German citizen, try the same thing with eBay, Facebook,
>> LinkedIn, PayPal and so on ... no thanks.
> Why should heirs have access to social accounts? Paypal, otoh, is a bank
On 11.07.2017 10:14, NdK wrote:
> Il 11/07/2017 09:44, Binarus ha scritto:
>
>> - If somebody tries to brute force the pin (or online banking password),
>> the access will be permanently denied if there are more than 3 failures
>> (the exact number may vary). That means th
he won't use it regularly (hopefully),
he probably will forget it after short time ...
Regards,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ate I have been given could be an S/MIME certificate. Now that I
know that, I am quite confident that I will be able to configure and use
S/MIME properly.
Once again, a big thanks for all the help and for your time!
Regards,
Binarus
___
Gnupg-users
c: Does anybody eventually know if and when Enigmail /
gpg4win will support certificates?
Thank you very much,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
,
Binarus
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
38 matches
Mail list logo