/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http
witha
couple of them now and still get the same error.
am i possibly missing something on my OS?
many thanks
sam
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
to symmetric encryption methods as well?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
On Sat, Jan 11, 2014 at 1:05 PM, Sam Kuper sam.ku...@uclmail.net wrote:
On Jan 9, 2014 7:16 PM, David Tomaschik da...@systemoverlord.com
wrote:
if the machine you are using for crypto operations is compromised, you
have lost (at least for the operations conducted while it is compromised
would be
grateful for pointers :)
Regards,
Sam
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
Cheers!
-Pete
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
soon after 2.0.20.
Shalom-Salam,
Werner
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
and then you only need to unlock the GPG keys...
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
?
The longevity of any public key cryptosystem should probably be
estimated in years or decades at the longest if you want any confidence
in your answer.
Regards,
--dkg
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
On Mon, Apr 1, 2013 at 3:38 PM, Melvin Carvalho melvincarva...@gmail.comwrote:
On 1 April 2013 22:50, David Tomaschik da...@systemoverlord.com wrote:
On Mon, Apr 1, 2013 at 10:46 AM, Daniel Kahn Gillmor
d...@fifthhorseman.net wrote:
On 04/01/2013 12:24 PM, adrelanos wrote:
gpg uses
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
in this way.
Even better would be a new smart card with a form factor similar to the
Yubikey Nano (https://www.yubico.com/products/yubikey-hardware/yubikey-nano/)
but that might be a pipe dream.
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
of numbers, letters and special chars).
What am I missing?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
not missing something obvious.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
appreciated.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
2011-11-19 16:32:27 scdaemon[17659] listening on socket `/tmp/gpg-dNT4ZZ/S.scdaemon'
2011-11-19 16:32:27 scdaemon[17659] handler for fd -1
instead of a tool designed for disk
encryption? TrueCrypt is cross-platform and works well... if you're
Windows-only, there's BitLocker, and for Linux there's LUKS/dm-crypt
and eCryptFS.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http
/nistpubs/800-63/SP800-63V1_0_2.pdf
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
, IIRC.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
is not a valid header, and is confusing gpg.
Most likely, this is caused by the email client on the sending side
wrapping the text. (Although maybe some receiving clients re-wrap
text, I'm not aware of any.)
Can you provide information on the client(s) in use?
--
David Tomaschik, RHCE, LPIC-1
System
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
that would be an issue, but I can't be sure. Keep in
mind that as long as the card is left in the reader, it would be
considered unlocked -- do you want to leave that laying around? (It
depends on your threat model, of course.)
Thanks!
Richard
--
David Tomaschik, RHCE, LPIC-1
System
On Tue, Aug 30, 2011 at 2:56 PM, Richard rich...@r-selected.de wrote:
On Tue, Aug 30, 2011 at 20:49, David Tomaschik da...@systemoverlord.com
wrote:
No, you can store a primary key. And you can use the 3 slots for any
purpose (though I believe they must all tie to the same primary key
that nowadays more and more low-processing power devices are used.
Such keys are at best a political statement and a good laugh for some
NSA folks.
Shalom-Salam,
Werner
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da
, wrong. Suggested readings:
https://secure.wikimedia.org/wikipedia/en/wiki/Entropy_%28information_theory%29,
https://secure.wikimedia.org/wikipedia/en/wiki/Password_strength and
NIST publication 800-63.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP
for my regular PIN. (The
admin PIN is somewhat longer.) Would this be considered a reasonable
length?
(Someone who can read the memory on a smart card by opening it up is
NOT in my threat model -- if they can do that, they have much easier
ways to coerce me into giving up my PIN.)
--
David
you can't do that
instantly.
Shalom-Salam,
Werner
Thanks Werner!
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing
On 08/23/2011 06:52 PM, Faramir wrote:
El 03-08-2011 9:40, ved...@nym.hush.com escribió:
Sorry, wrong link extension,
here is the correct one: http://www.pgpdump.net/
By the way, what would be required to run pgpdump locally? I guess
there is no compiled version for windows...
Best
On 08/10/2011 12:32 PM, Smith, Greg E wrote:
Hello,
I am having an issue where we have set a custom home directory for GPG
and configured the registry entry for HKCU\GNU\GNUPG\HomeDir=... The
script functions fine when someone is logged into the system with the
user account executing
character. (Aka \r.)
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
concerns from wallet
storage, for instance?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
Sorry, this was intended to be sent to the entire list, but I composed
it in a hurry my apologies.
On Tue, Jul 12, 2011 at 4:24 PM, David Tomaschik
da...@systemoverlord.com wrote:
assert() kills the program if the value in the parentheses evaluates
to FALSE. In this case, that means
keys is nowhere near.
(And by casually, I mean a difficulty similarly to what it takes to
wiretap a phone.)
[1] http://eprint.iacr.org/2010/006
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
. Ausnahmen regelt ein Bundesgesetz.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
where the RSA encryption was done to the plain text directly.
Likewise, OpenPGP signing is done on a hash of the plain text.
(Again, not on the plain text directly.)
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da
On 02/28/2011 05:38 PM, Denise Schmid wrote:
Thanks all for your help.
Now, the story gets even more funny: They claim to have used PGP split-key,
then encrypted the files with a randomized key, then encrypted the key with
individual keys.
So far so bad. But now comes the best: They
On 02/28/2011 06:17 PM, Marco Steinacher wrote:
Hi,
I use a OpenPGP smartcard with gnupg 2.0.14 and Ubuntu for different
tasks. From time to time I face the following problem: The gpg-agent
crashes for some reason after entering the PIN, 'ps' reports the daemon
process as a zombie
STAT
On 02/28/2011 08:20 PM, Daniel Kahn Gillmor wrote:
On 02/28/2011 06:49 PM, David Tomaschik wrote:
Each process has its own copy of the environment inherited from its
parent, so it's not possible to change the GPG_AGENT_INFO variable for
all processes. You could start gpg-agent with --use
On 02/27/2011 12:21 PM, Robert J. Hansen wrote:
On 2/26/11 9:24 PM, Jameson Rollins wrote:
http://josefsson.org/inline-openpgp-considered-harmful.html
* IT DOESN'T HANDLE ATTACHMENTS. That's fine with me: 95%+ of my
messages don't require attachments. Any technology that can hit 95% of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I've recently received my smart card, but was wondering what the best
practices are, mainly from a physical standpoint. When I use it in
my laptop reader, it sticks about 2 out of the side, and I have some
concern about this (i.e., getting damaged
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have a 3310 and with pcscd, I haven't even found the need to use the
scard group. I have found that occasionally I have to restart
scdaemon in order to get new readers/cards recognized. I haven't
narrowed it down specifically yet. (I just got my
On 02/26/2011 10:29 PM, Grant Olson wrote:
On 02/26/2011 08:52 PM, David Tomaschik wrote:
I have a 3310 and with pcscd, I haven't even found the need to use the
scard group. I have found that occasionally I have to restart
scdaemon in order to get new readers/cards recognized. I haven't
attempt to decrypt the signature using your public key.
If they are able to, they know your private key was used to produce the
signature, and if you have kept control of your private key, it must
have been signed by you.
Hope that helps.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open
While I realize that the ID-1 (full size) cards can be used with card
readers that support PIN entry, are there any other
advantages/disadvantages to one size over the other? At present, I feel
like the ID-000 form factor has more advantages because of the
portability and the lower cost of the
with any import taxes/customs trouble.
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
As usual, it all depends on your threat model. If you're really paranoid,
don't use gpg-agent. :)
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
...@iem.pw.edu.pl874oaiocpp.fsf%25lukasz.stelm...@iem.pw.edu.pl
--
Miłego dnia,
Łukasz Stelmach
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux
, 2010 at 11:24 AM, Robert J. Hansen r...@sixdemonbag.orgwrote:
On 12/10/2010 9:16 PM, David Tomaschik wrote:
Are there any disadvantages to distinct signature encryption keys?
None that I've found.
Is the weakness in the hash used to sign the key internally, or just when
it is used to sign
of
this group might be useful in my next steps. Your help is appreciated.
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
50 matches
Mail list logo