On Thu, 4 Jun 2009 22:55, li...@michel-messerschmidt.de said:
Is there any chance to force decryption of the files?
My secret keys are located on a OpenPGP smartcard.
@item --try-all-secrets
Don't look at the key ID as stored in the message but try all secret
keys in turn to find the
On Thu, 4 Jun 2009 23:50, allen.schu...@gmail.com said:
Couple of questions. Is there a mailing list for gpgshell? If
not, Does GPGShell support gnupg 2.x?
I don't know and I am not interested to look thi up. GPGShell is
proprietary software!
Note that there is another frontend called GnuPG
Hi there,
please, how can I make a keypair of DSA and ELG keys, 4 keys, as I understand,
and then export all of them to another machine's gpg?
Using --export, --export-secret-keys, --export-secret-subkeys, then --import
for each of 3 previous commands failed me... Also the same, if I used key
Would it be possible to do the same job that GPG does (using all the
same algorithms) simply using a pen and paper? You can do simple
public key crypto with RSA, by choosing two primes and doing a
multitude of stuff with them. I understand that it will take a while
to actually
As already mentioned a liveCD seems a good way to go.
I'd go for a wander down to the news agent and get a copy of a foreign
linux mag with a liveCD, say the UK Linux Format.
Your downloaded gnupg is probably fine. Your livecd is probably fine.
Since they both have to be compromised for an
On Fri, Jun 05, 2009 at 08:41:59AM +0200, Werner Koch wrote:
Is there any chance to force decryption of the files?
My secret keys are located on a OpenPGP smartcard.
@item --try-all-secrets
Don't look at the key ID as stored in the message but try all secret
keys in turn to find
On Fri Jun 5 02:00:55 2009, Kārlis Repsons karlis.reps...@gmail.com
wrote:
please, how can I make a keypair of DSA and ELG keys, 4 keys, as I
understand,
and then export all of them to another machine's gpg?
Using --export, --export-secret-keys, --export-secret-subkeys, then --import
On Jun 5, 2009, at 10:59 AM, James P. Howard, II wrote:
On Fri Jun 5 10:52:48 2009, David Shaw ds...@jabberwocky.com wrote:
--allow-secret-key-import is a no-op. It is no longer used for
anything.
Really? I could not import last week without it.
howar...@thermopylae:~$ gpg --version
On Jun 5, 2009, at 2:52 AM, Harry Rickards wrote:
Would it be possible to do the same job that GPG does (using all the
same algorithms) simply using a pen and paper? You can do simple
public key crypto with RSA, by choosing two primes and doing a
multitude of stuff with them. I
On 06/05/2009 02:33 PM, Robert J. Hansen wrote:
Active MitM is pretty much the military incendiary bomb in the living
room. A competent attacker who is controlling your network traffic and
wishes to subvert your system has so many ways to do it that you stand
effectively no chance of
On Friday 05 June 2009 17:07:14 David Shaw wrote:
On Jun 5, 2009, at 12:27 PM, Kārlis Repsons wrote:
However, I had there 3 subkeys today! And after doing import, they
all appear
through gpg, but no way to use any with kmail!
I also tried thekey == key ID, but it gave equal outputs for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/05/09 19:46, David Shaw wrote:
On Jun 5, 2009, at 2:52 AM, Harry Rickards wrote:
Would it be possible to do the same job that GPG does (using all the
same algorithms) simply using a pen and paper? You can do simple
public key crypto with
Daniel Kahn Gillmor wrote:
But a neighborhood kid who's playing tricks with your wireless router
(which can also be an active MitM) is another story.
Neighborhood kids who are playing tricks with your wireless router
clearly know more about your wireless router than you do -- so I
wouldn't be
13 matches
Mail list logo