-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Hi Stefan,
GPG4Win is a great package but unfortunately the included GnuPG 2.0.12
does not support the OpenPGP Card v2. Is there a schedule when a new
release of GPG4Win will be released? This would be great!
GPG4Win 2.0.1 / GnuPG 2.0.12
On Thu, 07 Jan 2010 09:36:26 +, makrober wrote:
G/PGP isn't widely used because it does not address adequately the
real-life operational circumstances of the potential user, and
I still believe that OpenPGP along with PGP 2.1 is the most used data
protection scheme for plain data and
Thanks for your comments Werner;
Werner Koch wrote:
On Thu, 07 Jan 2010 09:36:26 +, makrober wrote:
G/PGP isn't widely used because it does not address adequately the
real-life operational circumstances of the potential user, and
I still believe that OpenPGP along with PGP 2.1 is the
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
But the rest of the Why isn't [it] used is plain wrong.
G/PGP isn't widely used because it does not address adequately the
real-life operational circumstances of the potential user, and
Web of Trust is the main culprit. It brings an
Greg Sabino Mullane wrote:
But the rest of the Why isn't [it] used is plain wrong.
G/PGP isn't widely used because it does not address adequately the
real-life operational circumstances of the potential user, and
Web of Trust is the main culprit. It brings an enormous burden...
You're
On 01/07/2010 04:36 AM, makrober wrote:
*Most individuals will rarely, if ever, be motivated to communicate
in secrecy with someone they don't already have a trusted
relationship with*.
I beg to differ. anyone who has ever conducted online business has a
strong incentive for communications
Hey John,
Same code that was deployed on this server has worked on 2 other servers, my
dev and test servers. The code has not been altered in anyway. I've found
that the linux admin had to tweek the new test server to get it working like
the dev server. After that tweet was made the code
On 01/07/2010 09:45 AM, Daniel Kahn Gillmor wrote:
Why is this all relevant? There are good reasons why you might be
interested in knowing that someone specific signed something public , of
course (e.g. software signatures, advice on mailing lists or other fora,
etc). But for non-public
On 01/07/2010 11:50 AM, Alex Mauer wrote:
Many people have correspondence with people they never have and never
will meet in person, and knowing that it’s always the same person is
still helpful.
agreed, key continuity checking is itself a useful tool, and maybe more
OpenPGP implementations
On 1/7/10 12:08 PM, Mario Castelán Castro wrote:
very few really care about their privacity.
The fact that free credit reporting services are making a ton of
money, as are services like LifeLock and whatnot, plus the huge media
impact of identity theft, etc., all points to people knowing their
On Thu, 07 Jan 2010 10:50:35 -0600, Alex Mauer wrote:
They’re only unknown the first time you contact them. It is useful to
know that the second time you contact f...@example.com it’s the same
party you contacted the first time. Or that the phishing email you
MUA authors should really add a
On Thu, Jan 07, 2010 at 12:23:55PM -0500, Robert J. Hansen wrote:
On 1/7/10 12:08 PM, Mario Castelán Castro wrote:
very few really care about their privacity.
The fact that free credit reporting services are making a ton of
money, as are services like LifeLock and whatnot, plus the huge
Unfortunately it does not work for me (Thus I thought it wouldn't work
in general). When generating new keys I get the following error:
Ändern: (N)ame, (K)ommentar, (E)-Mail oder (F)ertig/(B)eenden? f
gpg: Prüfung der erstellten Unterschrift ist fehlgeschlagen: Bad signature
gpg: Beglaubigung
Hi,
libassuan 2.0.0 is a new branch of libassuan development. It provides a
shared library which is a dependency of of the upcoming versions of GPGME,
GnupG 2.1.x and others. Note that this version of libassuan is incompatible
with previous versions of libassuan, and can not be installed
No terrible shock - we knew this was coming, but still, how
wonderfully neat, and a new factoring record, too.
http://eprint.iacr.org/2010/006
Note that 1024-bit RSA has not yet been factored, but if you haven't
phased it out yet, it's really time to get started. It's supposed to
be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Mario Castelán Castro escribió:
...
I think the WoT and in general the cryptography is not widely used
because few people really care about their privacity.
I agree... one of my friends seem to think cryptography is useful for
mafia and
16 matches
Mail list logo