Sorry for the empty subject... fixed now
From: john espiro john_esp...@yahoo.com
To: gnupg-users@gnupg.org
Sent: Thu, March 11, 2010 7:25:45 AM
Subject:
I am using paperkey 1.2 from http://www.jabberwocky.com/software/paperkey/
and
dmtxwrite version 0.7.3
I'm a user of Pidgin with the off-the-record plugin:
http://www.cypherpunks.ca/otr/help/3.2.0/levels.php?lang=en
http://www.cypherpunks.ca/otr/help/3.2.0/authenticate.php?lang=en
Is there a way to be able to have off-the-record email conversations
with GPG technology? It would definitely
I'm a user of Pidgin with the off-the-record plugin:
http://www.cypherpunks.ca/otr/help/3.2.0/levels.php?lang=en
http://www.cypherpunks.ca/otr/help/3.2.0/authenticate.php?lang=en
In order to use GPG based email encryption properly, it's important for
users to authenticate with each other
On Thu, 11 Mar 2010, erythrocyte wrote:
With the recent news of researchers being able to crack 1024-bit RSA
keys using power fluctuations, I was wondering if it would be a good
idea to switch the RSA keys I have to some other algorithm. Both my
signing and encryption keys are 4096-bit keys. Am
On Thu, 11 Mar 2010 09:29, firasmr...@gmail.com said:
Is there a way to be able to have off-the-record email conversations
with GPG technology? It would definitely be a terrific thing. Email is
I was pondering with the idea to use the WoT or an existsing OpenPGP key
for fingerprint checking.
I'd personally prefer having a real OpenPGP plugin for gpg,...
Wouldn't that be the real solution?
Cheers,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Hi,
I am new to gpg command line utility for file encryption/decryption. I have
installed gpg4win v 2.0.2 trying to encrypt a file with a key that I
imported which is also listing while typing list-keys command
The issue is that I am getting encryption failed no public key while typing
in
On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote:
On Thu, 11 Mar 2010, erythrocyte wrote:
Ref:
http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/
Okay, let me sum up this article for you:
Researchers who had physical enough access to
Alrighty. But doesn't this compromise the layer of security offered by
the passphrase? What's the point having a passphrase at all, if it's so
easy to compromise a private key?
You might as well ask, what's the point of OpenPGP at all, if it's so easy to
Van Eyck your monitor? Or, if it's so
erythrocyte wrote:
On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote:
On Thu, 11 Mar 2010, erythrocyte wrote:
Ref:
http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/
Okay, let me sum up this article for you:
Researchers who had physical
On Mar 11, 2010, at 3:39 AM, erythrocyte wrote:
With the recent news of researchers being able to crack 1024-bit RSA
keys using power fluctuations, I was wondering if it would be a good
idea to switch the RSA keys I have to some other algorithm. Both my
signing and encryption keys are
Is there a way to be able to have off-the-record email conversations
with GPG technology? It would definitely be a terrific thing.
Not really. OTR uses DHKEA for symmetric key negotiation. This is an
interactive protocol: you send some information, the other person sends some
information
On 3/11/2010 9:13 PM, Robert J. Hansen wrote:
OpenPGP assumes the endpoints of the communication are secure.
If they're not, there's nothing OpenPGP can do to help you make it
secure.
...All tools have preconditions: the existence of a precondition doesn't mean
the tool is broken.
The
On 3/11/2010 9:15 PM, David Shaw wrote:
Basically, no, and for several reasons. There are a few things that need to
be understood about the new attack. Briefly, this is an attack that relies
on manipulating the power supply to the CPU, in order to cause it to make
errors in RSA
On 3/11/2010 7:52 AM, nagaram.c wrote:
Hi,
I am new to gpg command line utility for file encryption/decryption. I
have installed gpg4win v 2.0.2 trying to encrypt a file with a key
that I imported which is also listing while typing list-keys command
The issue is that I am
On Mar 11, 2010, at 3:16 AM, john espiro wrote:
I am using paperkey 1.2 from http://www.jabberwocky.com/software/paperkey/
and
dmtxwrite version 0.7.3
libdmtx version 0.7.3
If I run this command:
gpg --export-secret-key my...@me.com | paperkey --ignore-crc-error
--output-type raw |
Long story short, I use amanda for my backups and I've been using
encryptsimple for my backups. My PC died completely, and I'm trying to
get the backups onto another machine. I've stepped through the programs
and have found that it's calling gpg with
gpg --batch --quiet --no-mdc-warning
On Mar 11, 2010, at 7:40 PM, Matt Burkhardt wrote:
Long story short, I use amanda for my backups and I've been using
encryptsimple for my backups. My PC died completely, and I'm trying to get
the backups onto another machine. I've stepped through the programs and have
found that it's
On 3/11/2010 12:20 AM, erythrocyte wrote:
But what if there was no way to meet in person, make a phone call or a
VoIP call. I was wondering if using Pidgin with the OTR plugin (and
authenticating the OTR session using the QA method; see above link)
could be considered a secure channel to
Thanks for the response, the command
gpg --recepient testuserID --encrypt abc.txt
I used has double dashes still I gives the same error.
I think I am using the default keyring as I didn't change its location
Thanks,
Nag
-Original Message-
From: gnupg-users-boun...@gnupg.org
On 3/12/2010 10:54 AM, Doug Barton wrote:
Secure in this context is a relative term. (Note, I'm a long time user
of pidgin+OTR and a longer-time user of PGP, so I'm actually familiar
with what you're proposing.) If you know the person you're IM'ing well
enough, you can do a pretty good job of
21 matches
Mail list logo