Re: OT: Best way to send e-mails to a recipient that does know encryption

2024-01-02 Thread vedaal via Gnupg-users
If anyone wants to try out the encryption, please send me an email, and tell me what you want your passphrase to be. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: ADK's

2023-04-30 Thread vedaal via Gnupg-users
There are 2 simple workarounds to employment ADK's : [ 1 ]. Send a symmetrically encrypted message to the key with the ADK(This will require an agreed upon symmetric passphrase communicated in person, phone, or another non-ADK manner) [ 2 ]. Generate a non-ADK key, not uploaded to any server

Re: Status of original PGP?

2022-09-07 Thread vedaal via Gnupg-users
On 9/7/2022 at 6:14 PM, "Robert J. Hansen via Gnupg-users" wrote:On a lark I went looking for the current iteration of PGP. It was bought by Symantec some years ago, and the last I heard they'd renamed it to "Symantec Encryption Desktop". However, Symantec no longer has it available for

Re: Backing up your PGP key by hand

2022-05-29 Thread vedaal via Gnupg-users
On 5/26/2022 at 12:52 AM, "Robert J. Hansen via Gnupg-users" wrote: So, yeah. I'm going to be solidly on the side of "no, really, paper is a magic technology, just be sure to talk with an archivist first to ensure you're using the right kind of paper." = The other thing to consider is the

RE: Changing the encryption algorithm used for PGP/GPG private key

2022-02-18 Thread vedaal via Gnupg-users
n personal preferences, list only AES 256, Not the other strengths. Keep all of the s2k options you listed, and try generating a new key again Vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: First Amendment and Marines?

2022-01-29 Thread vedaal via Gnupg-users
On 1/29/2022 at 11:06 PM, "Mauricio Tavares via Gnupg-users" wrote: > The patient can choose any, all, any combination, or none of them. > And still get treatment. > Can you provide which regulation states that? I could have used it many times. = It's in the HIPPA act which requires

Re: pgp263iamulti06

2022-01-29 Thread vedaal via Gnupg-users
On 1/29/2022 at 11:02 PM, "Robert J. Hansen" wrote:> Please comment if this is adequate, or there is still a problem with > Disastry's Linux Version. Why? I've been trying to get people to move to OpenPGP for literally a quarter-century, Vedaal. I'm not going to

Re: First Amendment and Marines?

2022-01-29 Thread vedaal via Gnupg-users
On 1/29/2022 at 5:39 PM, "Mauricio Tavares via Gnupg-users" wrote Not quite. It cares about personal data from people residing in Europe at the time said data was collected. And even then, you need to be targeting EU/EEA residents. So, if a German citizen goes to FL and needs to stop at the

Re: Side-channel attacks

2022-01-18 Thread vedaal via Gnupg-users
upg's problem. Vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Side-channel attacks

2022-01-16 Thread vedaal via Gnupg-users
upgraded to versions where it was fixed. Vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: GnuPG - signed Telefax communication

2022-01-14 Thread vedaal via Gnupg-users
On 1/14/2022 at 11:46 AM, "Стефан Васильев via Gnupg-users" wrote:Hi all, If people have a modern Telefax machine, have you ever tried out to send a GnuPG signed Fax? = You can simply armor sign the message. Don't bother with the 'begin' and 'end' part, it can be added on the receiving

Re: Install gnupg on Linux machine ( For gpg encryption & decryption )

2022-01-04 Thread vedaal via Gnupg-users
t). It already has Gnupg installed by default when you download the .iso https://ubuntu.com/download#download All the Best Vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/

Re: Detaching signature from signed object

2021-06-21 Thread vedaal via Gnupg-users
out , to successfully use the -b command): https://www.angelfire.com/pr/pgpf/fcs.html The developer of Filecrypt is accessible in a link when downloading the Filecrypt on the majorgeeks site mentioned above. You might consider discussing a version of Filecrypt with him for your detach

[no subject]

2021-05-04 Thread vedaal via Gnupg-users
ncinerator afterwards. But really, if anyone is up against adversaries where this is necessary,this methods may ultimately not help. These adversaries are not known for their honor and fair play ... vedaal ___ Gnupg-users mailing list Gnupg-users@gnup

Re: How would you do that ...

2021-05-04 Thread vedaal via Gnupg-users
Or, for the really paranoid ;-)you can have random data on a read-only mini cdrom,and use it as an OTP, and throw it into a garbage incinerator afterwards. If you are up against adversaries where this is necessary,this methods may ultimately not help ... = On 5/4/2021 at 1:19 PM, "Ingo

Re: question - Gnupg compatibility with Symantec

2021-03-09 Thread vedaal via Gnupg-users
On 3/9/2021 at 4:46 AM, "Margaret via Gnupg-users Call" wrote: We would like to migrate our Symantec PGP to GNU PGP. We tested the system last week with new PGP users and a user that migrated to GNU from Symantec. We have fixed all bugs except one: Our legacy Symantec

re: How can I add encrypted comments

2021-01-14 Thread vedaal via Gnupg-users
vedaal at nym.hush.com vedaal at nym.hush.comwrote on Thu Jan 14 19:37:37 CET 2021: >but functionally, yes, it can be done.- my mistake. Can't really be done this way :-((= >[1] Armor the signature file ( gpg --armor filename.sig ) -should be enarmor instead of armor :-( this o

Re: How can I add encrypted comments.

2021-01-14 Thread vedaal via Gnupg-users
nd the pgp header of the encrypted file) [3] Save the whole thing as filename.sig.asc [4] gpg filename.sig,asc will automatically verify the sig if the original signed file 'filename' is present, and also decrypt the added comments

Re: Password Decript GPG public key

2020-08-25 Thread vedaal via Gnupg-users
y encrypted text? There still needs to be a way to 'enter' it as the 'passphrase'. If the OP doesn't mind saving it in a file-decsriptor way, that would work, but it would work the same as the secret key had a passphrase, or even if it was an unpublished publ

Re: Password Decript GPG public key

2020-08-24 Thread vedaal via Gnupg-users
n: mxtzphu.klemauj@qwejidnalldiopxz.wdb9D7ECA9BEDF40F804EB26A3C25FF072DDFD35F5D Only you and the person you send this key to, will be able to decrypt your symmetrically encrypted messages. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://list

Re: In case you use OpenPGP on a smartphone ...

2020-08-17 Thread vedaal via Gnupg-users
end a Sandisk newer 64gb card, because of the much faster transfer rates. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: In case you use OpenPGP on a smartphone ...

2020-08-11 Thread vedaal via Gnupg-users
but not really in my threat model 8^ vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: "encrypted with 1 passphrase"

2020-07-31 Thread vedaal via Gnupg-users
data: [4095 bits] gpg: public key is D35FB186 You need a passphrase to unlock the secret key for user: "vedaal nistar (all other addresses were spam flooded) " 4096-bit RSA key, ID D35FB186, created 2008-01-22 gpg: cancelled by user :symkey enc packet: version 4, cipher

Re: Traveling without a secret key

2020-07-08 Thread vedaal via Gnupg-users
y android phone with microSD slots. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: decrypt aes256 encrypted file without gpg-agent

2020-06-29 Thread vedaal via Gnupg-users
ssphrase to decrypt (n.b. I have not actually tried the above, so am unsure if it is effective) otherwise , just use GnuPG 1.4.x , and unless you ever need an elliptic key, it should do everything you want. vedaal ___ Gnupg-users mailing list G

Re: decrypt aes256 encrypted file without gpg-agent

2020-06-26 Thread vedaal via Gnupg-users
the keyring, gpg will still decrypt when using the option of --no-default-keyring (feature request: can GPG2 be made to work from only the command-line without a pine entry window, and without gpg-agent?) TIA vedaal ___ Gnupg-users mailing list Gnu

Fwd: The GnuPR FAQ

2020-05-12 Thread vedaal via Gnupg-users
ry Staple https://xkcd.com/936/ 8^) vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Fwd: The GnuPR FAQ

2020-05-11 Thread vedaal via Gnupg-users
8 = 1.336×10³⁹, still greater than a a 2^128 Brute Force Space. So, not only is is NOT *horrible* advice, it should be enough for anyone's threat model. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Proposal - variable line width for ASCII armor output

2020-02-26 Thread vedaal via Gnupg-users
LbnoC0E1p6e2uA2mlXtvNNt HaXPFll+Xk7U1/OuNjnFFyjUs30yDpxLT4O+46I/hioH7zGisTFjJO1iEuSO0RqO QZ3jsyjjBEhIOC9Aiko9FMhXa6MvCqIembcFQUm2v0XoZSl6PBvtBJDmVmGvLt1P GvSmaHRbRCZaiYk/KmV3d7axJQHXmt2CyFIJvw28yFh85PrGnZN6F/0TZmwZSEKh fGTZanDrJYrys3425Fd4=/Rbe-END PGP SIGNATURE- vedaal

Re: Proposal - variable line width for ASCII armor output

2020-02-26 Thread vedaal via Gnupg-users
learsigned messages with it''s header and footer, are somewhat 'resented' in any non-crypto group, and often don't verify anyway because of minor alterations by the media posting) vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://list

Re: Maybe a good date to create a new key pair ...

2020-02-03 Thread vedaal via Gnupg-users
eighth and fortieth position of the fingerprint). It might not be that simple, but it doesn't seem impossible, to create a Palindromic fingerprint, (and just reset your computer clock to 02/20/2020 at 02:20 am) 8^)) vedaal ___ Gnupg-users mailing list Gn

Re: Maybe a good date to create a new key pair ...

2020-02-02 Thread vedaal via Gnupg-users
Maybe try generating new keys until you have a keypair of palindromic primes, or at least a palindromic fingerprint http://mathworld.wolfram.com/PalindromicPrime.html 8^)) vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailma

Re: Extraction of public key from an encrypted etc. message

2019-11-17 Thread vedaal via Gnupg-users
On 11/15/2019 at 7:26 PM, "Steffen Nurpmeso" wrote:The public key _is_ in there, no? = No. Only the public Key ID is in there, not the entire public key, and and even this keyID can be hidden too, if the sender uses the option of --hidden-encrypt-t

Re: gpg encrypt always creates a new encrypted file

2019-10-28 Thread vedaal via Gnupg-users
tever you write as plaintext" | gpg -a -e -r -o -filename.gpg | more (obviously not intended for big files, or non-text files, but occasionally a useful workaround if you aren't comfortable with your system's 'wipe' process.) vedaal ___ Gnupg-users

Re: How to improve our GUIs (was: We have GOT TO make things simpler)

2019-10-05 Thread vedaal via Gnupg-users
xport Secret Keys" and works on Ubuntu (and probably on other Linux flavors too, but have not tested them) vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: how to recover secret key passphrase?

2019-08-20 Thread vedaal via Gnupg-users
-secret-key keyname The private key block should then appear in your terminal window. No passphrase is necessary unless you want to 'edit' the key. This works in both GnuPG 1.x and 2.x assuming that your keyrings are in your home directory. Don't use gpg-agent

Re: was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-13 Thread vedaal via Gnupg-users
d them to the keyserver, but at least then, no individual key by a real user, could be attacked. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-12 Thread vedaal via Gnupg-users
simply binding the subkey to a different master key, won't allow for anyone else other than the 'real' owner, to decrypt messages encrypted to that subkey? TIA vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Essay on PGP as it is used today

2019-07-23 Thread vedaal via Gnupg-users
G key of 4096, it's only necessary to compute for primes up to 2^2048. But, Since GnuPG uses 2 primes only in the 2^2048 size, for a 4096 bit key, then the amount of primes is actually: [ (2^2048) / ln(2^2048) ] - [ (2^2047) / ln (2^2047) ] = 1.37 x 10^613 So, not to worry about someon

Re: Ok this is a stupid questions

2019-02-26 Thread vedaal via Gnupg-users
ould trust WK and the GnuPG team even if they didn't *sign* a Warrant Canary (i / we all, sort-of trust the verification of the new GnuPG releases, with his sig), And if we *don't trust*, then signing a Warrant Canary with the same signing key as the GnuPG release, wouldn't help ;-

Re: AW: Ok this is a stupid questions

2019-02-26 Thread vedaal via Gnupg-users
On 2/26/2019 at 10:29 AM, "Stefan Claas" wrote: Von: vedaal via Gnupg-users Gesendet: Montag, 25. Februar 2019 22:09 An: justina colmena; gnupg-users@gnupg.org Betreff: Re: Ok this is a stupid questions Why do you think GnuPG is useless if you check the source

Re: Ok this is a stupid questions

2019-02-25 Thread vedaal via Gnupg-users
s they may be deserved. There are other forums ideally suited to that. Thanks. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: [k9mail/k-9] Makes PGP sign-only mails very difficult (#2375)

2019-02-05 Thread vedaal via Gnupg-users
ata is in the Plaintext, where it belongs, and not vulnerable to MIMT attacks (c) backward compatibility in maintained, and no new standards have to be designed vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: pgp-phone (was Gnupg-users Digest, Vol 184, Issue 22)

2019-02-02 Thread vedaal via Gnupg-users
On 2/1/2019 at 2:48 PM, "Stefan Claas" wrote:Maybe someone, in the future, can pick-up the idea of PGPfone and develop it further so that it can be used on Linux too or modern macOS. The old Windows version still runs fine, under Windows 7, for example. = Can be done on Ubuntu, or any

Re: gpg - difference --encrypt-to and --recipient

2019-01-06 Thread vedaal via Gnupg-users
On 1/3/2019 at 10:14 PM, "MFPA" wrote:> [3] only for the overly paranoid who revel in tedious > work-arounds 8^) : > (a) Encrypt to both yourself and the recipient > (b) Remove your own id packet from the ciphertext, > (c) Re-calculate the crc of the ciphertext > (d) Send the

Re: gpg - difference --encrypt-to and --recipient

2019-01-02 Thread vedaal via Gnupg-users
ep (a) This is just to point out, that if someone wants to think paranoidly about 'who else knows' what is encrypted in your encrypted e-mail that was encrypted only to you, it 'can' be done, (extremely tedious, and afaik , has not been implemented b

Re: OpenPGP key verification + legal framework

2018-11-05 Thread vedaal via Gnupg-users
n get the preferred email to register in google, and you have passport personal verification, just because there is another ID attached? It seems unnecessarily restrictive. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.o

Re: GPG on Android

2018-11-04 Thread vedaal via Gnupg-users
safe. fwiw, the gnupg apps work well on android, but I just don't trust the phone. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Slightly OT - i need the proper wording for a signed document

2018-11-01 Thread vedaal via Gnupg-users
s a line return as empty whitespace, so when trying to import the key, GnuPG does not recognize the empty whitespace, and reads the version line as continuous with the keyblock, and it won't import. vedaal ___ Gnupg-users mailing list Gnupg-users

Re: cannot decrypt file symmetric encrypted

2018-08-07 Thread vedaal via Gnupg-users
o with the string-to-key formation. When the passphrase is off, the 'key' generated from it, is wrong, and when that wrong 'key' is used to attempt decryption, gpg rightfully gives an error message that the 'key' is bad. maybe worthy of a note in the FAQ ... ) vedaal _

Re: Break backwards compatibility already: it’s time. Ignore the haters. I trust you.

2018-05-21 Thread vedaal
ng as these versions are still being archived (which is reasonable for the forseeable future), they should have no problems. So, to put in a vote for RJH, “Break backwards compatibility already: it’s time. Ignore the haters. I trust you.” vedaal ___ Gnup

Re: Efail or OpenPGP is safer than S/MIME

2018-05-14 Thread vedaal
use exclusively that, and can easily handle the hardwired MDC fail, and will even be thankful for the GnuPG 'protection'. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

DRM

2018-01-16 Thread vedaal
g: you may upload this key to any participating keyserver or something along those lines, assuming that keyservers will abide by this and require this 'comment' before accepting a key vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: question about determining the key length

2017-11-14 Thread vedaal
--verbose --verbose The full command would then be: gpg --expert --verbose --verbose --gen-key vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: New smart card / token alternative

2017-11-08 Thread vedaal
rstanding that the sender and receiver post to and check certain websites This could be facilitated by Tails/Tor, although there are still some vulnerabilities: https://tails.boum.org/doc/about/warning/index.en.html#index2h1 vedaal ___ Gnupg-users

Re: New smart card / token alternative

2017-11-06 Thread vedaal
from the Tails USB avoids a screencapturer, and using on on-screen keyboard avoids a hardware keyboard logger. But even so, there are problems with using it on an 'unknown' computer : https://tails.boum.org/doc/about/warning/index.en.html#index2h1 vedaal _

Re: gpg: [don't know]: 1st length byte missing

2017-10-21 Thread vedaal
On 10/21/2017 at 1:14 PM, "Felix E. Klee" wrote:See the attached file. When I try to decrypt it using `gpg -d`, I get: gpg: [don't know]: 1st length byte missing = gnupg mailing list automatically scrubs attachments. please list the encrypted text as part of the inline message.

Re: Generating a new keypair through GnuPG 2.x in Ubuntu 16.0.4

2017-10-15 Thread vedaal
directory '/home/londo/gnupg-2.2.1/ntbtls-0.1.2' Makefile:387: recipe for target 'all' failed make: *** [all] Error 2 londo@londo-earth-trinket:~/gnupg-2.2.1/ntbtls-0.1.2$ =[end quoted output]= Should I try ntbtls 0.1.1 or an even earlier version? T

Re: Generating a new keypair through GnuPG 2.x in Ubuntu 16.0.4

2017-10-11 Thread vedaal
) 2.2.1-beta1 libgcrypt 1.8.1 [...] = Sorry, here it is: londo@londo-earth-trinket:~$ gpg2 --verbose --verbose --version gpg (GnuPG) 2.1.11 libgcrypt 1.6.5 Should I get the new Libcrypt? TIA Vedaal ___ Gnupg-users mailing list Gnupg-users@g

Generating a new keypair through GnuPG 2.x in Ubuntu 16.0.4

2017-10-10 Thread vedaal
generator a better chance to gain enough entropy. gpg: agent_genkey failed: Not supported Key generation failed: Not supported londo@londo-earth-trinket:~$ =[end quoted terminal]= What am I forgetting/doing wron

Re: E-mail with deniable authentication

2017-08-29 Thread vedaal
be 'leaked' to the public for deniability, if necessary. There are probably other similar variations of this approach. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: SHA1 collision found

2017-02-24 Thread vedaal
day, even with the google cloud computer sharing efforts, and the breakthrough of finding pdf's with the same hash. Again, I fully support moving to a secure hash, but I do think that users have more than enough time until the open-pgp group issues the official standa

Re: SHA1 collision found

2017-02-23 Thread vedaal
-able* and a good reason to move on to a future SHA256 hash, it would not be transferable (at this time, based on the PDF collision data), to find a fingerprint collision for any v4 key. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http

Re: How do you let your M.D. know about emailselfdefense.org and gnupg.org so that it's easier for folks unfamiliar to setup and use than having to go over the too long material, the too complicated m

2016-12-01 Thread vedaal
to an easy GnuPG gui tutorial, once people think that encryption can be useful and 'fun'. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Should always add myself as recipient when ecrypting?

2016-03-21 Thread vedaal
, there is minimal danger in continuing to use this passphrase for additional symmetrical messages.) It will allow decryption of sent messages, while providing anonymity. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: cipher used when both --encrypt and --symmetric is specified

2016-02-29 Thread vedaal
user, the sender, is encrypting the message, it is again reasonable that the sender be able to choose the algorithm with which the sender feels most comfortable. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: cipher used when both --encrypt and --symmetric is specified

2016-02-26 Thread vedaal
--symmetric --encrypt --sign -r 0x1234567890ABCDEF filename The encryptions should now be with AES256 for both the symmetric part and the part encrypted to your key. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-25 Thread vedaal
If you want a simple random list, look at diceware: http://world.std.com/~reinhold/diceware.html Both the page and the diceware lists are available in many languages, including German vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http

Re: Trusting other keys a message was encrypted to

2015-11-06 Thread vedaal
trusts the sender's *trust* of the other keys, can go ahead and multliple encrypt the reply. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Trusting other keys a message was encrypted to

2015-11-06 Thread vedaal
vedaal at nym.hush.com vedaal at nym.hush.com wrote on Fri Nov 6 16:46:21 CET 2015 : Since you are not able to encrypt either the real or the fake Rumplestiltsken key, you have no way of knowing if the session key is genuine or not in that packet. = Sorry, typo, meant to say

Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread vedaal
. Just a suggestion. The implementers can best decide how much extra work this would require, and if there is a simpler better way to accomplish the desired result. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org

Re: Archaic PGP usage

2015-07-24 Thread vedaal
://www.spywarewarrior.com/uiuc/disastry/263multi.htm (btw, If anyone knows how to install this on 64 bit Ubuntu 14.04 please let me know. It wouldn't compile on Ubuntu 12.x, but was able to install the linux executable PGP on a 32 bit system, but can't on 14.x 64 bit.) TIA vedaal

Re: [openpgp] Unuploadable Keys

2015-07-21 Thread vedaal
form ) If such a key-type were implemented, would it need a change in 4880, other than a notice to allow it? vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: s2k-cipher-mode default

2015-06-02 Thread vedaal
, then the user will need to specify the option either in gnupg.conf or on the command line. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Lower Bound for Primes during GnuPG key generation

2015-05-22 Thread vedaal
which is a fairly small number of primes to check, for this type of attack to find the GnuPG keypair. Also, does GnuPG automatically reject twin primes ( p, p+2) , and Sophie-Germain primes (p, 2p+1) ? TIA, vedaal ___ Gnupg-users mailing list Gnupg

Re: Lower Bound for Primes during GnuPG key generation

2015-05-22 Thread vedaal
? - Sorry, I meant does GnuPG automatically reject the PAIR since they are trivial to factor. Thanks, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Lower Bound for Primes during GnuPG key generation (was Re: [Enigmail] Popescu and keys)

2015-05-21 Thread vedaal
to mount an attack on a keypair by starting with trying successive primes greater than this lower bound, and possibly successfully find *some* GnuPG secret keys? TIA, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman

Re: AES-NI, symmetric key generation

2015-03-10 Thread vedaal
part of generating the session key for the symmetrically encrypted message, will be using a random 64 character GnuPG generated session key as it's password. You can't find a better password (especially even one that you don't have to remember ;-) ) vedaal

Re: German ct magazine postulates death of pgp encryption

2015-03-02 Thread vedaal
new life into pgp encryption ... vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: MIME or inline signature ?

2015-02-13 Thread vedaal
just want to do this for the mailing list, where most people don't sign their messages anyway, then just send the plaintext without worrying about the signature. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman

Re: How to detect extraneous content in clearsigned (--clearsign) files?

2015-01-12 Thread vedaal
, or a detached signature of a text file, *will* detect any spaces added on to a line. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

RE: Unable to encrypt file with private/public key

2014-12-18 Thread vedaal
to include the option of '--armor' or '-a' in your encryption command: gpg2 -u FFEEDDCC -r AABBCCDD -a -e supersecret.txt vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread vedaal
20 years that RSA has been around and many different attacks have been tried, *this* type of attack has not seemed feasible enough for anyone to try. So, Short summary, No useful information can be gleaned. vedaal ___ Gnupg-users mailing list Gnupg

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread vedaal
ciphertexts, and still not construct the RSA Private key. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: gpg4usb: Portable GUI for GnuPG

2014-11-14 Thread vedaal
to do some work on files on my usb ;-) ) Anyone here have any experience with it? TIA, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread vedaal
common older RSA key of 1028 ... vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: New beta

2014-09-19 Thread vedaal
' failed make: *** [all] Error 2 So, can it be done on Cygwin, using other steps/commands first? (btw, have not had any problems compiling, making, and installing gnupg 1.4.x on Cygwin). TIA, vedaal ___ Gnupg-users mailing list Gnupg-users

Re: Keeping .gnupg folder in cloud

2014-09-18 Thread vedaal
On Thu Sep 18 17:13:58 CEST 2014 Werner Koch w...@gnupg.org wrote: But right, there are other files which should not be published. Is it possible to have .gnupg on a smart card ? vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http

Re: encrypting to expired certificates

2014-09-17 Thread vedaal
, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: encrypting to expired certificates

2014-09-16 Thread vedaal
: Invalid option --faked-system-time vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: encrypting to expired certificates

2014-09-16 Thread vedaal
-system-time' option . vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: encrypting to expired certificates

2014-09-15 Thread vedaal
, and that GnuPG is prudently set up so that it 'shouldn't be 'too easy' to do, so that one will think twice it one 'really' needs to do it. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Is it possible to sign a message with multiple digest algorithms?

2014-09-06 Thread vedaal
that, if possible, the command would be similar to gpg --armor --digest-algo SHA256 RIPEMD160 --clearsign but this fails. If it is possible, how does GPG handle multiple signatures? = It can be done if a separate signing subkey is used for each different digest. vedaal

Re: Hal Finney

2014-09-01 Thread vedaal
will have him back again ... with Profound Respect, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: [openpgp] SHA-2 support should be mandatory – change defaults

2014-08-13 Thread vedaal
verify a V4 key signature). vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: symmetric email encryption

2014-07-18 Thread vedaal
mis-understood you and this discussion). vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: gnupg - pgp reading signed files

2014-07-15 Thread vedaal
be that it's a variant unique to pgp. I'll try to see what happens in Disastry's version, if it will accept gnupg's compression vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Encrypt a signed text

2014-07-07 Thread vedaal
connected first. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: On the advisability of stronger digests than SHA-1 in OpenPGP certifications [was: Re: riseup.net OpenPGP Best Practices article]

2014-06-27 Thread vedaal
it. Many thanks to WK and the GnuPG development team for taking the trouble to provide backward compatibility even as GnuPG grows better and more robust. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg

re: Mascot_p

2014-06-17 Thread vedaal
#D Gnu might be a consideration. vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

  1   2   3   4   >