If anyone wants to try out the encryption, please send me an email, and tell me
what you want your passphrase to be.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
There are 2 simple workarounds to employment ADK's :
[ 1 ]. Send a symmetrically encrypted message to the key with the
ADK(This will require an agreed upon symmetric passphrase communicated
in person, phone, or another non-ADK manner)
[ 2 ]. Generate a non-ADK key, not uploaded to any server
On 9/7/2022 at 6:14 PM, "Robert J. Hansen via Gnupg-users" wrote:On a
lark I went looking for the current iteration of PGP. It was
bought by Symantec some years ago, and the last I heard they'd renamed
it to "Symantec Encryption Desktop". However, Symantec no longer has
it
available for
On 5/26/2022 at 12:52 AM, "Robert J. Hansen via Gnupg-users" wrote:
So, yeah. I'm going to be solidly on the side of "no, really, paper
is
a magic technology, just be sure to talk with an archivist first to
ensure you're using the right kind of paper."
=
The other thing to consider is the
n personal preferences, list only AES 256,
Not the other strengths.
Keep all of the s2k options you listed, and try generating a new key
again
Vedaal ___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
On 1/29/2022 at 11:06 PM, "Mauricio Tavares via Gnupg-users" wrote:
> The patient can choose any, all, any combination, or none of them.
> And still get treatment.
>
Can you provide which regulation states that? I could have used
it many times.
=
It's in the HIPPA act which requires
On 1/29/2022 at 11:02 PM, "Robert J. Hansen" wrote:> Please
comment if this is adequate, or there is still a problem with
> Disastry's Linux Version.
Why?
I've been trying to get people to move to OpenPGP for literally a
quarter-century, Vedaal. I'm not going to
On 1/29/2022 at 5:39 PM, "Mauricio Tavares via Gnupg-users" wrote
Not quite. It cares about personal data from people residing in
Europe at the time said data was collected. And even then, you need to
be targeting EU/EEA residents. So, if a German citizen goes to FL and
needs to stop at the
upg's problem.
Vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
upgraded to versions
where it was fixed.
Vedaal ___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 1/14/2022 at 11:46 AM, "Стефан Васильев via
Gnupg-users" wrote:Hi all,
If people have a modern Telefax machine, have you ever
tried out to send a GnuPG signed Fax?
=
You can simply armor sign the message.
Don't bother with the 'begin' and 'end' part, it can be added on the
receiving
t). It
already has Gnupg installed by default when you download the .iso
https://ubuntu.com/download#download
All the Best
Vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/
out , to successfully use the -b
command):
https://www.angelfire.com/pr/pgpf/fcs.html
The developer of Filecrypt is accessible in a link when downloading
the Filecrypt on the majorgeeks site mentioned above.
You might consider discussing a version of Filecrypt with him for your
detach
ncinerator afterwards.
But really, if anyone is up against adversaries where this is
necessary,this methods may ultimately not help.
These adversaries are not known for their honor and fair play ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnup
Or, for the really paranoid ;-)you can have random data on a read-only
mini cdrom,and use it as an OTP, and throw it into a garbage
incinerator afterwards.
If you are up against adversaries where this is necessary,this methods
may ultimately not help ...
=
On 5/4/2021 at 1:19 PM, "Ingo
On 3/9/2021 at 4:46 AM, "Margaret via Gnupg-users Call" wrote:
We would like to migrate our Symantec PGP to GNU PGP. We tested the
system last week with new PGP users and a user that migrated to GNU
from Symantec. We have fixed all bugs except one:
Our legacy Symantec
vedaal at nym.hush.com vedaal at nym.hush.comwrote on Thu Jan 14
19:37:37 CET 2021:
>but functionally, yes, it can be done.- my mistake. Can't really
be done this way :-((= >[1] Armor the signature file ( gpg --armor
filename.sig ) -should be enarmor instead of armor :-( this
o
nd the pgp header of the encrypted file)
[3] Save the whole thing as filename.sig.asc
[4] gpg filename.sig,asc will automatically verify the sig if the
original signed file 'filename' is present, and also decrypt the added
comments
y encrypted text?
There still needs to be a way to 'enter' it as the 'passphrase'. If the OP
doesn't mind saving it in a file-decsriptor way, that would work,
but it would work the same as the secret key had a passphrase, or even if it
was an unpublished publ
n:
mxtzphu.klemauj@qwejidnalldiopxz.wdb9D7ECA9BEDF40F804EB26A3C25FF072DDFD35F5D
Only you and the person you send this key to, will be able to decrypt your
symmetrically encrypted messages.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://list
end a Sandisk newer
64gb card, because of the much faster transfer rates.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
but not really in my threat model 8^
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
data: [4095 bits]
gpg: public key is D35FB186
You need a passphrase to unlock the secret key for
user: "vedaal nistar (all other addresses were spam flooded) "
4096-bit RSA key, ID D35FB186, created 2008-01-22
gpg: cancelled by user
:symkey enc packet: version 4, cipher
y android phone with microSD slots.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ssphrase to decrypt
(n.b. I have not actually tried the above, so am unsure if it is effective)
otherwise , just use GnuPG 1.4.x , and unless you ever need an elliptic key, it
should do everything you want.
vedaal
___
Gnupg-users mailing list
G
the keyring,
gpg will still decrypt when using the option of --no-default-keyring
(feature request: can GPG2 be made to work from only the command-line without
a pine entry window, and without gpg-agent?)
TIA
vedaal
___
Gnupg-users mailing list
Gnu
ry Staple
https://xkcd.com/936/
8^)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
8 = 1.336×10³⁹,
still greater than a a 2^128 Brute Force Space.
So, not only is is NOT *horrible* advice, it should be enough for anyone's
threat model.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
LbnoC0E1p6e2uA2mlXtvNNt
HaXPFll+Xk7U1/OuNjnFFyjUs30yDpxLT4O+46I/hioH7zGisTFjJO1iEuSO0RqO
QZ3jsyjjBEhIOC9Aiko9FMhXa6MvCqIembcFQUm2v0XoZSl6PBvtBJDmVmGvLt1P
GvSmaHRbRCZaiYk/KmV3d7axJQHXmt2CyFIJvw28yFh85PrGnZN6F/0TZmwZSEKh
fGTZanDrJYrys3425Fd4=/Rbe-END PGP SIGNATURE-
vedaal
learsigned messages with it''s
header and footer, are somewhat 'resented' in any non-crypto group, and often
don't verify anyway because of minor alterations by the media posting)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://list
eighth and fortieth position of the fingerprint).
It might not be that simple, but it doesn't seem impossible, to create
a Palindromic fingerprint,
(and just reset your computer clock to 02/20/2020 at 02:20 am) 8^))
vedaal
___
Gnupg-users mailing list
Gn
Maybe try generating new keys until you have a keypair of palindromic
primes,
or at least a palindromic fingerprint
http://mathworld.wolfram.com/PalindromicPrime.html
8^))
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailma
On 11/15/2019 at 7:26 PM, "Steffen Nurpmeso" wrote:The
public key _is_ in there, no?
=
No.
Only the public Key ID is in there, not the entire public key, and and even
this keyID can be hidden too,
if the sender uses the option of --hidden-encrypt-t
tever you write as plaintext" | gpg -a -e -r -o -filename.gpg | more
(obviously not intended for big files, or non-text files, but occasionally a
useful workaround if you aren't comfortable with your system's 'wipe' process.)
vedaal
___
Gnupg-users
xport Secret Keys"
and works on Ubuntu
(and probably on other Linux flavors too, but have not tested them)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
-secret-key keyname
The private key block should then appear in your terminal window.
No passphrase is necessary unless you want to 'edit' the key.
This works in both GnuPG 1.x and 2.x
assuming that your keyrings are in your home directory.
Don't use gpg-agent
d them to the keyserver,
but at least then, no individual key by a real user, could be attacked.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
simply binding the subkey to a different master key,
won't allow for anyone else other than the 'real' owner, to decrypt messages
encrypted to that subkey?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
G key of 4096, it's only necessary to compute for primes up to 2^2048.
But,
Since GnuPG uses 2 primes only in the 2^2048 size, for a 4096 bit key,
then the amount of primes is actually:
[ (2^2048) / ln(2^2048) ] - [ (2^2047) / ln (2^2047) ] = 1.37 x 10^613
So, not to worry about someon
ould trust WK and the GnuPG team even if they didn't *sign* a Warrant Canary
(i / we all, sort-of trust the verification of the new GnuPG releases, with his
sig),
And if we *don't trust*, then signing a Warrant Canary with the same signing
key as the GnuPG release,
wouldn't help ;-
On 2/26/2019 at 10:29 AM, "Stefan Claas" wrote:
Von: vedaal via Gnupg-users
Gesendet: Montag, 25. Februar 2019 22:09
An: justina colmena; gnupg-users@gnupg.org
Betreff: Re: Ok this is a stupid questions
Why do you think GnuPG is useless if you check the source
s they may be deserved.
There are other forums ideally suited to that.
Thanks.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ata is in the Plaintext, where it belongs, and
not vulnerable to MIMT attacks
(c) backward compatibility in maintained, and no new standards have to
be designed
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 2/1/2019 at 2:48 PM, "Stefan Claas" wrote:Maybe someone, in the
future, can pick-up the idea of PGPfone and develop it further
so that it can be used on Linux too or modern macOS. The old Windows
version still runs
fine, under Windows 7, for example.
=
Can be done on Ubuntu, or any
On 1/3/2019 at 10:14 PM, "MFPA" wrote:> [3] only for the overly
paranoid who revel in tedious
> work-arounds 8^) :
> (a) Encrypt to both yourself and the recipient
> (b) Remove your own id packet from the ciphertext,
> (c) Re-calculate the crc of the ciphertext
> (d) Send the
ep (a)
This is just to point out, that if someone wants to think paranoidly
about 'who else knows' what is encrypted in your encrypted e-mail that
was encrypted only to you, it 'can' be done,
(extremely tedious, and afaik , has not been implemented b
n get the preferred email to register in google, and you have
passport personal verification,
just because there is another ID attached?
It seems unnecessarily restrictive.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.o
safe.
fwiw, the gnupg apps work well on android, but I just don't trust the phone.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
s a line return as empty whitespace, so when trying to import the
key,
GnuPG does not recognize the empty whitespace, and reads the version line as
continuous with the keyblock, and it won't import.
vedaal
___
Gnupg-users mailing list
Gnupg-users
o with the string-to-key formation.
When the passphrase is off, the 'key' generated from it, is wrong, and when
that wrong 'key' is used to attempt decryption,
gpg rightfully gives an error message that the 'key' is bad.
maybe worthy of a note in the FAQ ... )
vedaal
_
ng as these versions are still being archived (which is reasonable for the
forseeable future), they should have no problems.
So,
to put in a vote for RJH,
“Break backwards compatibility already: it’s time. Ignore the haters. I trust
you.”
vedaal
___
Gnup
use exclusively that, and can
easily handle the hardwired MDC fail, and will even be thankful for the GnuPG
'protection'.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
g: you may upload this key to any participating keyserver
or something along those lines, assuming that keyservers will abide by this and
require this 'comment' before accepting a key
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--verbose --verbose
The full command would then be:
gpg --expert --verbose --verbose --gen-key
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
rstanding that the sender and receiver post to and
check certain websites
This could be facilitated by Tails/Tor, although there are still some
vulnerabilities:
https://tails.boum.org/doc/about/warning/index.en.html#index2h1
vedaal
___
Gnupg-users
from the Tails USB avoids a
screencapturer, and using on on-screen keyboard avoids a hardware keyboard
logger.
But even so, there are problems with using it on an 'unknown' computer :
https://tails.boum.org/doc/about/warning/index.en.html#index2h1
vedaal
_
On 10/21/2017 at 1:14 PM, "Felix E. Klee" wrote:See the attached
file. When I try to decrypt it using `gpg -d`, I get:
gpg: [don't know]: 1st length byte missing
=
gnupg mailing list automatically scrubs attachments.
please list the encrypted text as part of the inline message.
directory '/home/londo/gnupg-2.2.1/ntbtls-0.1.2'
Makefile:387: recipe for target 'all' failed
make: *** [all] Error 2
londo@londo-earth-trinket:~/gnupg-2.2.1/ntbtls-0.1.2$
=[end quoted output]=
Should I try ntbtls 0.1.1 or an even earlier version?
T
) 2.2.1-beta1
libgcrypt 1.8.1
[...]
=
Sorry,
here it is:
londo@londo-earth-trinket:~$ gpg2 --verbose --verbose --version
gpg (GnuPG) 2.1.11
libgcrypt 1.6.5
Should I get the new Libcrypt?
TIA
Vedaal
___
Gnupg-users mailing list
Gnupg-users@g
generator a better chance to gain enough entropy.
gpg: agent_genkey failed: Not supported
Key generation failed: Not supported
londo@londo-earth-trinket:~$
=[end quoted terminal]=
What am I forgetting/doing wron
be 'leaked' to the public for deniability,
if necessary.
There are probably other similar variations of this approach.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
day, even with the google cloud computer sharing efforts,
and the breakthrough of finding pdf's with the same hash.
Again, I fully support moving to a secure hash, but I do think that
users have more than enough time until the open-pgp group issues the
official standa
-able* and a good reason to move on to a future
SHA256 hash, it would not be transferable (at this time, based on the
PDF collision data), to find a fingerprint collision for any v4 key.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
to an easy GnuPG
gui tutorial, once people think that encryption can be useful and
'fun'.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, there is minimal danger in continuing to use this passphrase for
additional symmetrical messages.)
It will allow decryption of sent messages, while providing anonymity.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
user, the sender, is encrypting the message,
it is again reasonable that the sender be able to choose the algorithm with
which the sender feels most comfortable.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
--symmetric --encrypt --sign -r
0x1234567890ABCDEF filename
The encryptions should now be with AES256 for both the symmetric part and the
part encrypted to your key.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
If you want a simple random list, look at diceware:
http://world.std.com/~reinhold/diceware.html
Both the page and the diceware lists are available in many languages,
including German
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
trusts the sender's *trust* of the other keys, can go
ahead and multliple encrypt the reply.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
vedaal at nym.hush.com vedaal at nym.hush.com
wrote on Fri Nov 6 16:46:21 CET 2015 :
Since you are not able to encrypt either the real or the fake
Rumplestiltsken key, you have no way of knowing if the session key is
genuine or not in that packet.
=
Sorry, typo,
meant to say
.
Just a suggestion.
The implementers can best decide how much extra work this would require, and if
there is a simpler better way to accomplish the desired result.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
://www.spywarewarrior.com/uiuc/disastry/263multi.htm
(btw,
If anyone knows how to install this on 64 bit Ubuntu 14.04 please let me know.
It wouldn't compile on Ubuntu 12.x, but was able to install the linux
executable PGP on a 32 bit system, but can't on 14.x 64 bit.)
TIA
vedaal
form )
If such a key-type were implemented, would it need a change in 4880, other than
a notice to allow it?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
,
then the user will need to specify the option either in gnupg.conf or on the
command line.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
which is a fairly small number of primes
to check, for this type of attack to find the GnuPG keypair.
Also,
does GnuPG automatically reject twin primes ( p, p+2) , and Sophie-Germain
primes (p, 2p+1) ?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg
?
-
Sorry,
I meant does GnuPG automatically reject the PAIR since they are trivial to
factor.
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
to mount an attack on a keypair by starting with trying
successive primes greater than this lower bound,
and possibly successfully find *some* GnuPG secret keys?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
part of generating the session key for the symmetrically
encrypted message, will be using a random 64 character GnuPG generated session
key as it's password.
You can't find a better password (especially even one that you don't have to
remember ;-) )
vedaal
new life into pgp encryption ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
just want to do this for the mailing list, where most people don't
sign their messages anyway,
then just send the plaintext without worrying about the signature.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
, or a detached signature of a text file, *will* detect any
spaces added on to a line.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
to include the option of '--armor'
or '-a' in your encryption command:
gpg2 -u FFEEDDCC -r AABBCCDD -a -e supersecret.txt
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
20 years that RSA has been around and
many different attacks have been tried,
*this* type of attack has not seemed feasible enough for anyone to try.
So,
Short summary,
No useful information can be gleaned.
vedaal
___
Gnupg-users mailing list
Gnupg
ciphertexts, and still not
construct the RSA Private key.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
to do some
work on files on my usb ;-) )
Anyone here have any experience with it?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
common older RSA key of 1028 ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
' failed
make: *** [all] Error 2
So,
can it be done on Cygwin, using other steps/commands first?
(btw, have not had any problems compiling, making, and installing gnupg 1.4.x
on Cygwin).
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users
On Thu Sep 18 17:13:58 CEST 2014 Werner Koch w...@gnupg.org wrote:
But right, there are other files which should not be published.
Is it possible to have .gnupg on a smart card ?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
: Invalid option --faked-system-time
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
-system-time' option .
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, and that GnuPG is prudently set up so that it 'shouldn't be 'too
easy' to do, so that one will think twice it one 'really' needs to do it.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
that, if possible, the command would be similar to
gpg
--armor --digest-algo SHA256 RIPEMD160 --clearsign but this fails.
If it is possible, how does GPG handle multiple signatures?
=
It can be done if a separate signing subkey is used for each different digest.
vedaal
will
have him back again ...
with Profound Respect,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
verify a V4 key signature).
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
mis-understood you and this discussion).
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
be that it's a variant unique to pgp.
I'll try to see what happens in Disastry's version, if it will accept gnupg's
compression
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
connected first.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
it.
Many thanks to WK and the GnuPG development team for taking the trouble to
provide backward compatibility even as GnuPG grows better and more robust.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
#D Gnu might be a consideration.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
1 - 100 of 362 matches
Mail list logo