On 1/2/2024 at 9:26 AM, "Ingo Klöcker" wrote:
>Posteo will release data to authorities if they are forced to do
>so by a
>judicial order. See their transparency reports for details:
>https://posteo.de/en/site/transparency_report
>
>I'm still using Posteo.
=
Another option is Hushmail.
There are 2 simple workarounds to employment ADK's :
[ 1 ]. Send a symmetrically encrypted message to the key with the
ADK(This will require an agreed upon symmetric passphrase communicated
in person, phone, or another non-ADK manner)
[ 2 ]. Generate a non-ADK key, not uploaded to any server
On 9/7/2022 at 6:14 PM, "Robert J. Hansen via Gnupg-users" wrote:On a
lark I went looking for the current iteration of PGP. It was
bought by Symantec some years ago, and the last I heard they'd renamed
it to "Symantec Encryption Desktop". However, Symantec no longer has
it
available for
On 5/26/2022 at 12:52 AM, "Robert J. Hansen via Gnupg-users" wrote:
So, yeah. I'm going to be solidly on the side of "no, really, paper
is
a magic technology, just be sure to talk with an archivist first to
ensure you're using the right kind of paper."
=
The other thing to consider is the
On 2/18/2022 at 3:12 AM, "Daniel Colquitt via Gnupg-users" wrote:Just
to follow up that this isn't a gpgwin problem. I have a Debian
installation and generated a test key using GnuPG and the same
gpg.conf file
=
Try this:
In gpg.conf file add the option of
--expert
and in personal
On 1/29/2022 at 11:06 PM, "Mauricio Tavares via Gnupg-users" wrote:
> The patient can choose any, all, any combination, or none of them.
> And still get treatment.
>
Can you provide which regulation states that? I could have used
it many times.
=
It's in the HIPPA act which requires
On 1/29/2022 at 11:02 PM, "Robert J. Hansen" wrote:> Please
comment if this is adequate, or there is still a problem with
> Disastry's Linux Version.
Why?
I've been trying to get people to move to OpenPGP for literally a
quarter-century, Vedaal. I'm not going to suddenly switch
On 1/29/2022 at 5:39 PM, "Mauricio Tavares via Gnupg-users" wrote
Not quite. It cares about personal data from people residing in
Europe at the time said data was collected. And even then, you need to
be targeting EU/EEA residents. So, if a German citizen goes to FL and
needs to stop at the
On 1/18/2022 at 11:26 AM, "Robert J. Hansen via Gnupg-users" wrote:>
1.4 should be able to decrypt all 2.6 generated data.
Not from the Disastry builds, which extended 2.6 to support newer
algorithms.
=
1.4 still can decrypt and verify anything in Disastry's last build.
He died before
On 1/16/2022 at 6:12 PM, "Robert J. Hansen via Gnupg-users" wrote:On
this mailing list we sometimes see requests for help from people
running dangerously antique versions of GnuPG. Wasn't all that long
ago
I was asked for help with something in the 1.2 series (!!). Without
exception, our
On 1/14/2022 at 11:46 AM, "Стефан Васильев via
Gnupg-users" wrote:Hi all,
If people have a modern Telefax machine, have you ever
tried out to send a GnuPG signed Fax?
=
You can simply armor sign the message.
Don't bother with the 'begin' and 'end' part, it can be added on the
receiving
On 1/4/2022 at 7:23 AM, "Rayapati Rama Rao (NCS)" wrote
Could you please let me know which gnupg software to download for
Linux machine to make use of gpg encryption & decryption.
Also, may I know if any packages required to install on Linux prior
to gnupg installation.
On 6/20/2021 at 2:13 PM, "Matthew Richardson via Gnupg-users"
wrote:Is there any way in GnuPG to detach (or extract) a signature
from a signed
object? For example, a signed object is created with:-
>gpg --armor --output signedfile.asc --sign inputfile.txt
where what is wanted is a detached
On 5/4/2021 at 1:19 PM, "Ingo Klöcker" wrote:I'd always use full
disk encryption ideally with the key stored on a USB
token. Otherwise, with a very good passphrase.
And, after use, wipe the disk and destroy the token.
Modern enterprise-level SSDs also have secure erase, but, of course,
you'd
Or, for the really paranoid ;-)you can have random data on a read-only
mini cdrom,and use it as an OTP, and throw it into a garbage
incinerator afterwards.
If you are up against adversaries where this is necessary,this methods
may ultimately not help ...
=
On 5/4/2021 at 1:19 PM, "Ingo
On 3/9/2021 at 4:46 AM, "Margaret via Gnupg-users Call" wrote:
We would like to migrate our Symantec PGP to GNU PGP. We tested the
system last week with new PGP users and a user that migrated to GNU
from Symantec. We have fixed all bugs except one:
Our legacy Symantec
vedaal at nym.hush.com vedaal at nym.hush.comwrote on Thu Jan 14
19:37:37 CET 2021:
>but functionally, yes, it can be done.- my mistake. Can't really
be done this way :-((= >[1] Armor the signature file ( gpg --armor
filename.sig ) -should be enarmor instead of armor :-( this
outputs
On 1/14/2021 at 4:47 AM, "Ayoub Misherghi via Gnupg-users" wrote:
body p { margin-bottom:0; margin-top:0; }
I am encrypting and signing documents with myself as the
receiver. Nobody else will want to look inside them. Is it
possible to add encrypted
On 8/25/2020 at 3:21 PM, "Stefan Claas" wrote:
>Maybe he could try to use a secret key without a passphrase and
>give then the secret key personally to his friend?
=
And just have the ascii armored text of the secret key as the passphrase for
the symmetrically encrypted text?
On 8/24/2020 at 8:36 AM, "Guille De La Torre via Gnupg-users"
wrote:
>
is it possible to create a key for symmetric encryption
>in such a way that the person who has my public key does not need
>to enter a password? to decrypt.
=
No. and Yes.8^)
It is not possible that the person
On 8/15/2020 at 1:02 PM, "Stefan Claas" wrote:
>Ok, worked! :-) SHA256 hashes matched from both devices.
=
Great to hear!
-
>Only thing I have to do is purchasing an sd memory card, because
>the regular memory is to low.
=
If you can afford it, there are 1 TB microsd cards
On 8/11/2020 at 3:00 PM, "Stefan Claas" wrote:
...
>As understood a Pegasus operator can do what ever
>he likes to do remotely, anonymously with our (Android/iOS)
>smartphone, without that we know that this happens.
...
>in form of a best practice FAQ (cross-platform), to no longer use
>On 2020-07-29 at 10:20 -0700, Ayoub Misherghi via Gnupg-users
>wrote:
>> A gpg says "encrypted with 1 passphrase". Are there situations
>where a message gets encrypted with multiple passphrases?
=
Not exactly,
but there are situations where GnuPG can simultaneously encrypt
On 7/8/2020 at 3:49 PM, "Juergen Bruckner via Gnupg-users"
wrote:
>Basically, it has to be said that you should definitely have a
>backup of your key. And you have to be very careful with your SC or tokens.
>In principle it is almost the same as losing your credit card or
>passport etc.
On 6/29/2020 at 12:40 PM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:
>I don't have gpg-agent installed, on this particular server, where
>I
>need to decrypt one file.
=
Try this very long workaround :
[1] Install a fake homedirectory
[2] Install a fake keyring (1 public and secret
On 6/26/2020 at 4:54 AM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:
>
>Hello,
>
>I have file encrypted with symmetric cipher (aes256) and not
>signed.
>
>How can I decrypt it without using gpg agent ?
>
>I get these errors:
>
>$ gpg -d file.gpg
>gpg: failed to start gpg agent
>...
>gpg:
Robert J. Hansen rjh at sixdemonbag.org wrote on
Tue May 12 16:41:09 CEST 2020:
>You can get by just fine in most everyday English with a vocabulary of
>5,000 words. Stick to those words and you'll have an easy-to-remember
>passphrase.
=
That's absolutely correct, Horse! Battery Staple
On 5/11/2020 at 6:15 PM, "Robert J. Hansen" wrote:
>
>This arrived in my inbox: I'm presenting it here without comment.
>My
>response will be following in a moment.
>
>
> Forwarded Message
>Subject: The GnuPR FAQ
>Date: Mon, 11 May 2020 14:19:07 -0600
>From: James Long
On 2/26/2020 at 2:03 PM, "Michał Górny" wrote:
>
>Why 'change it back'? Unless I'm mistaken, GPG shouldn't have any
>real
>problem with a different base64 width, as long as the overall
>layout is
>preserved. I've just did a quick test and GPG is entirely happy
>with
>the result after
On 2/26/2020 at 11:27 AM, "Stefan Claas via Gnupg-users"
wrote:
>I like to make a proposal for future versions of GnuPG,
>where a user can change the line witdh of ASCII armor
>output.
=
It would not be compatible with older versions.
The simplest thing for you, (or any users who
On 2/3/2020 at 4:48 PM, "Stefan Claas via Gnupg-users" wrote:Mark
wrote:
> I know the palindrome day was yesterday (although the article missed
> several others in the 21st century). I am curious on how you were
able
> to create a key with a certain fingerprint.
I used the (Windows) program
On 2/2/2020 at 4:44 PM, "Stefan Claas via Gnupg-users" wrote:Since
this day is so special (for me) I decided to do it again with a new
(RSA)
key. But this time with a 'proper' Fingerprint, to celebrate this day.
:-)
0202 2020 D638 E78F 4DFE 737C 419F 025C 897D B2E6
=
Maybe try
On 11/15/2019 at 7:26 PM, "Steffen Nurpmeso" wrote:The
public key _is_ in there, no?
=
No.
Only the public Key ID is in there, not the entire public key, and and even
this keyID can be hidden too,
if the sender uses the option of --hidden-encrypt-to
vedaal
On 10/28/2019 at 3:43 PM, "Phillip Susi" wrote:Anil Kumar
Pippalapalli via Gnupg-users writes:
> Hello,
> I am trying to encrypt a file on my system using gpg —encrypt command but it
> always creates a new encrypted file I want to overwrite the original file
> instead so that I can only open
On 10/5/2019 at 12:58 PM, "Werner Koch via Gnupg-users"
wrote:
>I agree with you and, although I sometimes hack on GPA, I would
>suggest
>Kleopatra. On Windows Kleopatra and the Explorer plugin do
>actually do
>what you suggest and we LOTS of folks using Gpg4win. Be it for
>plain
>file
On 8/20/2019 at 12:57 PM, "ilf" wrote:
> My problem is getting a usable input for john
>from the current the current private-keys-v1.d/ gpg-agent private key key
>store format.
=
Try This:
[1] Open a new terminal command prompt window
[2] Type gpg -a --export-secret-key keyname
The
On 8/13/2019 at 7:59 AM, "Kristian Fiskerstrand"
wrote:
>As you correctly point out its really not that relevant for
>encryption
>subkeys. It does have security implementations for signing
>subkeys; see
>[cross-certification section] for some details on that.
>
>References:
On 8/12/2019 at 7:28 AM, "Juergen Bruckner via Gnupg-users"
wrote:
>Am 11.08.19 um 23:47 schrieb Anonymous Remailer (austria):
>>
>> https://github.com/skeeto/pgp-poisoner
=
Here is a quote from the above site:
=[ begin quoted material ]=
As far as keyserver weaknesses go,
On 7/22/2019 at 7:12 AM, "Robert J. Hansen" wrote:
>Mathematicians have come up with different ways to estimate how
>many
>primes there were under a certain value
...
>The first estimate for π(x) was "x divided by the natural
>logarithm of x".
...
>If we do that same equation for a 2048-bit
On 2/26/2019 at 3:28 PM, "Stefan Claas" wrote:And maybe
another FOSS point? How about issuing Warrant Canaries?
I have seen that VeraCrypt does this.
=
Yes.
The latest one is here:
https://www.idrix.fr/VeraCrypt/canary.txt
Interesting, but it still boils down to *trust*.
I would trust
On 2/26/2019 at 10:29 AM, "Stefan Claas" wrote:
Von: vedaal via Gnupg-users
Gesendet: Montag, 25. Februar 2019 22:09
An: justina colmena; gnupg-users@gnupg.org
Betreff: Re: Ok this is a stupid questions
Why do you think GnuPG is useless if you check the source
On 2/25/2019 at 2:29 PM, "justina colmena via Gnupg-users" wrote:
That's why I have to call foul play on proprietary operating systems.
Encryption is theoretical only: in practice useless, moot, crippled,
broken, and terminally back-doored with all the malware, adware,
spyware, worms,
On 2/5/2019 at 4:50 PM, "justina colmena via Gnupg-users" wrote:>THE
DATE PROBLEM. Only the body of the email is signed, not the envelope
headers, namely the subject and intended >recipients, and probably
most importantly, the date. It would be nice to have an option to
automatically include
On 2/1/2019 at 2:48 PM, "Stefan Claas" wrote:Maybe someone, in the
future, can pick-up the idea of PGPfone and develop it further
so that it can be used on Linux too or modern macOS. The old Windows
version still runs
fine, under Windows 7, for example.
=
Can be done on Ubuntu, or any
On 1/3/2019 at 10:14 PM, "MFPA" wrote:> [3] only for the overly
paranoid who revel in tedious
> work-arounds 8^) :
> (a) Encrypt to both yourself and the recipient
> (b) Remove your own id packet from the ciphertext,
> (c) Re-calculate the crc of the ciphertext
> (d) Send the
On 1/2/2019 at 3:59 PM, "justina colmena via Gnupg-users" wrote:
>My opinion is that should be the case. However, most MUAs I've used
>include the BCC recipients' keys in the encryption along with the To
>and CC recipients' keys, so any email addresses in the user-IDs of
>these keys are visible
On 11/5/2018 at 3:39 PM, "Viktor" wrote:
>You can register a Google account with any email address. Simply,
>instead of creating an account on our service (another password
>that
>needs to be saved), you create an account on Google, or use an
>existing one.
=
Ok,
But suppose I want to
On 11/4/2018 at 4:58 PM, "Roland" wrote:
>
>Hello list,
>
>I share the wish for encrypted email on Android, but I am afraid
>of storing a secret key on my android phone. (theft, hacking,
>loss, etc)
>
>How do you feel about that?
=
Exactly the same way.
Android phones (software) are
Am Donnerstag, den 01.11.2018, 17:42 +0100 schrieb Stefan Claas:
> On Thu, 01 Nov 2018 16:09:56 +0100, Dirk Gottschalk wrote:
> That is the reason why i like to sign the .pdf, containing my key
> data, with a qualified eIDAS conform signature. The detached GnuPG
> sig should be an
On 8/2/2018 at 3:01 PM, "Dirk Gottschalk via Gnupg-users"
wrote:
>Am Donnerstag, den 02.08.2018, 14:11 +0200 schrieb Stefano
>Tranquillini:
>> Hi all,
>> last year I encrypted some files, today i tried to decrypt them
>but
>> the
>> decryption fails
>
>> stefano@~/Downloads/words$ gpg -d
50 matches
Mail list logo