On 10/11/2011 05:14 PM, Jean-David Beyer wrote:
Let us assume you are the bad guy
Okay.
Unless you have my encrypted keys, you have to access my computer
(unless you have already stolen it, in which case there are much
easier ways to invade the machine), you will have to try logging in
Hold on a second there. You seem to be making some extremely
unwarranted assumptions.
Take a look:
Unless you have my encrypted keys, you have to access my computer
(unless you have already stolen it, in which case there are much
easier ways to invade the machine), you will have to try
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/13/11 7:51 AM, Jerome Baum wrote:
Take a look:
I did. You said I have to access your computer, to try logging in
through the Internet. I don't. I just have to find an exploit.
Saying my front door is locked is great, but it's not so
On 2011-10-13 14:14, Robert J. Hansen wrote:
On 10/13/11 7:51 AM, Jerome Baum wrote:
Take a look:
I did. You said I have to access your computer, to try logging in
through the Internet. I don't. I just have to find an exploit.
I didn't say anything (modulo Take a look).
Saying my front
On 10/13/2011 8:29 AM, Jerome Baum wrote:
I didn't say anything (modulo Take a look).
At this point it seems to me you're being deliberately obtuse. Have a
nice day.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Hi,
I've been happily using my key for many years. It started off in PGP on
Windows and I imported it into GnuPG 1.4.9 on Debian Lenny a few years ag=
o.
At that time I revoked a few of the old UIDs and the encryption subkey.
I then created a new encryption subkey which I've been using ever
On 11 October 2011 22:32, Robert J. Hansen r...@sixdemonbag.org wrote:
Accurate to 6%, there are 2**25 seconds in a year. Worth remembering:
it makes certain kinds of computations much easier. (It follows there
would be about 2**35 seconds in a thousand years, or 2**45 seconds in a
million.)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen wrote:
On 10/11/2011 05:14 PM, Jean-David Beyer wrote:
Let us assume you are the bad guy
Okay.
Unless you have my encrypted keys, you have to access my computer
(unless you have already stolen it, in which case there are
On 10/13/11 10:03 AM, Jean-David Beyer wrote:
It seems to me that to do much damage to my machine, you need to get a
shell with root access. And to do that, do you not pretty much need the
root password?
Nope. Local exploits are enough.
Take a look at the kernel.org exploit as an example.
On Thu, Oct 13, 2011 at 10:03:56AM -0400, Jean-David Beyer wrote:
It seems to me that to do much damage to my machine, you need to get a
shell with root access.
Depends on what you regard as damage.
Do you need root privileges to use your private gpg keys ???
I never run a web browser as
Hello,
I am building a system at work for automatic creation of PDF files and sending
them by mail. I am thinking about adding a signature file (not by the key of
the sendig person but by a key belonging to the mail system; similar to a
gateway signing solution just not singing the whole mail
Wouldn't --comment be easier?
--
Nothin' ever doesn't change, but nothin' changes much.
-- OK Go
Breadth of IT experience, and depth of knowledge in the DNS.
Yours for the right price. :) http://SupersetSolutions.com/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Friday 14 October 2011 at 12:08:12 AM, in
mid:201110140108.18571.mailinglis...@hauke-laging.de, Hauke Laging
wrote:
Probably most of you have experienced the What strange
attachment have you sent to me in your email? I can't
open that...
13 matches
Mail list logo