On 29/01/2010 16:31, Sean Rima wrote: {think I sent my last wrong} >> >>> it is not a great idea to use hushmail keys for open pgp encryption >>> or authentication >> >>> (1) the keys are not updated, and can't be for the same email >>> address, >>> so, for example, i've been with hushmail since it started, and my >>> key is a 1024 bit key and signs with SHA-1 >>> (to be fair, i imagine that whenever this becomes a 'real' threat, >>> hushmail will allow for modifications/new keys) >> >>> (2) the hushmail user probably will not be able to decrypt a gnupg >>> encrypted message in hushmail if the encryption algorithm chosen >>> isn't currently being used by hushmail, which, depending on how old >>> the key is, may not be the encryption algorithm listed on the key, >> >>> and if the hushmail user uses gnupg (preferable ;-) ), then he/she >>> would be better off generating a new key in gnupg, and just leave >>> the hushmail key for hushmail users >> >> >> I will pass this info on, though how far we get is debatable :) Thanks >> for the info >> > Ok, on this, I unstalled gpg 2.0.10 and installed 1.4.10b and I can import and encrypt to Hushmail keys. Does this mean that gpg 2.0.10 is broken or is it correctly handling the key where 1.4.10b is not
Sean -- GSWoT and CaCert WOT Assurer My public GPG Key http://sl.srima.eu/sfr .tel http://rima.tel/ I believe that every human has a finite number of heartbeats. I don't intend to waste any of mine running around doing exercises. - Neil Armstrong
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users