Re: Text (non-binary) keyring format
* Alejandro Colomar via Gnupg-users: > I don't use git to be able to roll back, but rather to know at which > state a backup is. For example, I gave a backup to a family member last > time I saw him, and I know that backup is N commits behind my current > keyring. Looks like none of this depends on the keyring being stored in a binary or textual format, does it? Even knowing only the date of having passed on a backup would be enough to figure out the commits made after handing over the backup. Then there are commit comments, tags, branchs... Maybe think of the process of creating and handing over a backup like a software release? In any case, as far as I am concerned, the increased performance of using a binary keyring in daily GnuPG use far outweighs any perceived convenience of a text-based format, especially when that text-based format can be easily generated using the "gpg" binary. Note that I am saying that as a true fan of text-based formats myself. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Text (non-binary) keyring format
* Alejandro Colomar via Gnupg-users: > I have my ~/.gnupg keyring under git source control, which helps > creating and updating backups, and also having a history of the > changes. I find that having the contents in binary format is odd, and > think it would be much better if it was all stored in text files. I have my GnuPG keyrings and config under version control as well. However, I think that the key material does not really lend itself to text-based inspection with something like 'diff', in contrast to config files. For recovery, I have sometimes accessed historic keyrings, but only as a whole. and then exported a certain key, to be re-imported into my newer keyring. I don't see myself accessing some part of a keyring without using the GnuPG binary, so I wonder what tanglibe benefit a text-based storage format would bring to the table? -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: baffled at "Chapter 1. Getting Started" due to gpg: agent_genkey failed: No pinentry
* Dennis Clarke via Gnupg-users: > I have no idea what you are talking about. That is not a manpage. I can see that you have no idea. Look closely at the URL you posted [1], and you will notice the infix "/manual/". [1] https://www.gnupg.org/gph/en/manual/c14.html What I wrote in my last message stands. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: baffled at "Chapter 1. Getting Started" due to gpg: agent_genkey failed: No pinentry
* Dennis Clarke via Gnupg-users: > Looking at https://www.gnupg.org/gph/en/manual/c14.html one would get > the idea that GPG would "just work" given that pinentry is right there > in my PATH [...] How would one get that idea? The manual page you linked contains neither the string "pinentry" nor "PATH". -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announcement] GnuPG for OS X 2.4.5
GnuPG for OS X / macOS release 2.4.5 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.4.4
GnuPG for OS X / macOS release 2.4.4 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.4.3
GnuPG for OS X / macOS release 2.4.3 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.4.2
GnuPG for OS X / macOS release 2.4.2 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . This release also includes updates for several library dependencies. The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.4.1
GnuPG for OS X / macOS release 2.4.1 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.4.0 released
GnuPG for OS X / macOS release 2.4.0 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . It took me longer than usual to provide this release, because I ran into build problems. I also spent several weeks in hospitals over the last couple of months, and I am still not well today, so I hope you can forgive the delay. ;-) The disk image signature key is available via public keyservers, and it can also be downloaded from https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) GnuPG 2.4.x is installed in /usr/local/gnupg-2.4 instead of the formerly hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. Enjoy. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: GnuPG on Macbook Pro
* Matthias Apitz: > Can I use GnuPG (and passwordstore, the latter is only a shell > script) on Mac? The shell looks nearly like a normal Linux system https://sourceforge.net/projects/gpgosx/ should do the trick. I use it on all my Macs (High Sierra and newer versions), and it integrates with the macOS Keychain application, if you so desire. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.3.8 released
GnuPG for OS X / macOS release 2.3.8 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key was uploaded to keyservers in July 2022 and should now be widely available. It can also be downloaded using the URL https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) Important: GnuPG 2.3.x is installed in /usr/local/gnupg-2.3 instead of the previously hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
[Announce] GnuPG for OS X 2.3.7 released
GnuPG for OS X / macOS release 2.3.7 is now available for download via https://sourceforge.net/p/gpgosx/docu/Download/ . The disk image signature key was uploaded to keyservers on 2022-07-07 and should now be widely available. It can also be downloaded using https://www.seichter.de/pgp/gpgosx-signing.asc . pub ed25519/FD56297D9833FF7F 2022-07-07 [SC] [expires: 2027-07-06] Key fingerprint = EAB0 FE4F F793 D9E7 028E C8E2 FD56 297D 9833 FF7F uid [ultimate] Ralph Seichter (GnuPG for OS X signing key) Important: Starting with this release, GnuPG 2.3.x is installed in /usr/local/gnupg-2.3 instead of the previously hardcoded directory /usr/local/gnupg-2.2. This enables installing both stable and LTS releases of GnuPG for OS X side by side, for advanced users' needs. The one caveat is that the latest installation will replace existing soft links in /usr/local/{bin,lib}. Please use absolute paths like /usr/local/gnupg-2.2/bin/gpg2 if necessary. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: GnuPG 2.2.36 released
* Andrew Gallagher: > As of 2130Z today this key still had not reached pgpkeys.eu, so I have > just uploaded it there by hand; most other syncing servers should have > it within the hour. Thanks, Andrew. For possible future key uploads, I'll keep in mind that pgp.mit.edu is not the most viable choice these days. Using it has been my habit for so many years that I forgot the server pool has changed considerably. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Looking for new Maintainer for gpgOSX
* Patrick Brunschwig: > Many thanks to Ralph for takin over so quickly! Thank you for faithfully taking care of GnuPG for OS X for many years, even though in the end you did not own a Mac anymore. I hope you will continue your excellent work on Enigmail. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: GnuPG 2.2.36 released
* Werner Koch via Gnupg-users: > This is a quick announcement that a new GnuPG release for 2.2 is > available. GnuPG for OS X / macOS version 2.2.36 is now available via the URL https://sourceforge.net/projects/gpgosx/files/ . This is the first relase since Patrick Brunschwig passed stewardship of the project to me, so please note the following changes: 1.) Starting today, disk images (*.dmg) are signed with a new ed25519 key (EAB0FE4FF793D9E7028EC8E2FD56297D9833FF7F). This key has been uploaded to pgp.mit.edu today, but the site is once again very sluggish and it might take a while to sync the key to other pool members. For this reason, I'll include the public key here: -BEGIN PGP PUBLIC KEY BLOCK- mDMEYsY2JRYJKwYBBAHaRw8BAQdAHRCBW5+Dhmt7pdtksvpIkk3/SY8oULxLR6hs xg0yT/+0K1JhbHBoIFNlaWNodGVyIChHbnVQRyBmb3IgT1MgWCBzaWduaW5nIGtl eSmIlgQTFgoAPhYhBOqw/k/3k9nnAo7I4v1WKX2YM/9/BQJixjYlAhsDBQkJZgGA BQsJCAcDBRUKCQgLBRYDAgEAAh4FAheAAAoJEP1WKX2YM/9/HN8BAOcfzou/g9KI YRXA4ePZlVGSZrKCwfE4LL23YfikJr5jAQDKQRW4IQnYPHvlyHAHpcxDD/U/c1VO MylkSvfkkSBmBw== =MgmS -END PGP PUBLIC KEY BLOCK- 2.) The Install.pkg file included in the disk image is unsigned, because I have not subscribed to Apple's developer program. I am not sure yet if I will do so in the future. Thus, it might be necessary to right-click on Install.pkg and using the popup menu instead of double-clicking, depending on the version of macOS you are using. Should you wish to contact me off-list regarding the GnuPG for OS X project, please send mail to "gpgosx ~AT~ seichter ~DOT~ de". -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: gpg --verify fails, no key?
* mailinglisten: > Has the tarball been signed with two keys? According to the output you posted there are two signatures from two separate keys, made on two different days. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How would you do that ...
* Stefan Vasilev via Gnupg-users: > How would you solve this task? With Alice having to rely on cryptography she can do in her head? Some shift cipher and carrier pigeons. :-) -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: We shall value email usage
* Bernhard Reiter: > Just wondering if there is a standard for sharing email drafts ... https://tools.ietf.org/html/rfc6154 defines optional attributes for "special-use" mailboxes. That applies to IMAP only, of course, but it may be sufficient, depending on a user's client/server combination. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Newbie question.
* Johan Wevers: > Do you have examples of this for security related subjects? I try not to rely on Wikipedia, in particular when searching for sensitive subjects. Besides, if that was unclear, I mentioned Wikipedia as a general example of the good concept of a Wiki colliding with humanity, not for any particular subject matter. Too many cooks, and some without training or taste buds. Used to be that compiling an encyclopedia took a huge number of competent researchers and authors. No wonder the things were so damn expensive. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Newbie question.
* Ayoub Misherghi via Gnupg-users: > How about collective and cooperative effort in a wiki, or cloud > funding pledges or donations? Those who contribute (money or effort) > get privilege of some kind. >From what I observed over the years, a majority of Wikis only really work within closely knit groups of people where contributions are limited to a select few who genuinely know what they are writing about. I do not want amateurs, be it well-meaning or malicious, write about security related subjects in a Wiki, because that might (in the eyes of casual visitors and search-engines) cause their scribblings to be confused with facts. The amount of BS that can be found on Wikipedia is case in point. A Wiki about encryption with write access limited to people who demonstrably understand the math sounds like a good thing to me, but a "Community Wiki" does not. Community usually (and sadly) means too many loud-mouthed, attention-seeking bozos. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: decrypt aes256 encrypted file without gpg-agent
* Fourhundred Thecat: > Looks like you have no real arguments, and keep repeating same stuff > all over again. *You* accusing *me* of not having real arguments is just precious. :-) > I see no benefit for anybody in continuing this discussion. At last, we can agree on something. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: decrypt aes256 encrypted file without gpg-agent
* Fourhundred Thecat: >> Show us a body of your work which proves you have the necessary >> skills to critique the GnuPG authors' work. Until you do, your >> "judgment" is moot. > > An idea should be considered on its own merit. What "idea" would that be, exactly? > You should counter my criticism with facts, instead of attacking me > personally. I am not attacking you. Read what I wrote in this thread. I just doubt that you have enough knowledge about the motivation behind and the inner workings of GnuPG to offer your "critique" (which I consider personal dislike for certain behaviour) until you convince me otherwise. Based on what you wrote so far, you are just some random person behind a pseudonym. What are your credentials in this field? What qualification do you have that would enable you to call the work of other people "bad design" with actual justification? Have you designed and maintained software on the scale of GnuPG, for decades, with a worldwide user base, dealing with security, usability and compatibility issues, having to find some compromise between the various aspects? > You can either reply with counterargument, or ignore my messages in > this thread. You can either tell people why your opinion should matter, or live with being called out for not doing so. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: decrypt aes256 encrypted file without gpg-agent
* Fourhundred Thecat: > I am basing my judgment on universal principles, that apply not only > to gpg or other software, but design of any systems in general. Universal principles, oh my. In other words, you don't know nearly enough about the finer points of GnuPG design goals, don't know much about the challenges of evolutionary software design, and thus don't know too well what you are talking about, universally speaking. Show us a body of your work which proves you have the necessary skills to critique the GnuPG authors' work. Until you do, your "judgment" is moot. > Take a car, as an analogy: [...] Unrelated nonsense. Was that really the best you could come up with? -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: decrypt aes256 encrypted file without gpg-agent
* Fourhundred Thecat: >> Whining about a design detail of free software? Get a grip. > > There are more examples of bad design. Are there now? GnuPG is software that has evolved since its introduction in 1997. Can you show me any meaningful software of yours that has been evolving over 23 years and has what you consider "good design"? It should be interesting. > In fact, gpg epitomizes a perfect anti-UNIX design. (See Eric > S. Raymond for details, what UNIX philosophy means) Ha, now you're trying to teach your grandma to suck eggs. ;-) Besides, quoting ESR is a somewhat risky business. He said and wrote a lot over the decades, much of which I consider nonsense. > I believe this project is going in the wrong direction, and bad design > decisions are being made. What insight do you have in the design and development of GnuPG; in its goals and restrictions? There is a difference between you not liking something for a personal reason, and objectively "bad design". You are entitled to your opinion of course, but unless you can demonstrate the skills to come up with a better design for free software that offers the same functionality as GnuPG, that opinion does not mean so much. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: decrypt aes256 encrypted file without gpg-agent
* Fourhundred Thecat: > I am protesting the fact, that gpg can no longer be used without the > agent. Whining about a design detail of free software? Get a grip. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Certified OpenPGP-encryption after release of Thunderbird 78
> I just checked the BSI's list of certified products[1]. Sorry, I forgot to include the URL: [1] https://www.bsi.bund.de/DE/Themen/Sicherheitsberatung/ZugelasseneProdukte/Liste_Produkte/Liste_Produkte_node.html ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Certified OpenPGP-encryption after release of Thunderbird 78
* karel-v: > With the approaching release of Thunderbird 78 Gpg4Win and Enigmail > won't be available any longer and the new OpenPGP-implementation of > Thunderbird won't be certified to the best of my knowledge. I just checked the BSI's list of certified products[1]. Gpg4Win and Gpg4KDE are currently listed until 2022-06-30, and you can continue using them. Thunderbird and Enigmail are not included in that list, so you are apparently using your own software mix anyway. Enigmail will no longer be available for Thunderbird 78, but you can copy message bodies between Thunderbird and GPG using the clipboard. Of course, this is a major inconvenience, but currently it seems that it's either this method or sticking with the current Thunderbird version and Enigmail. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Who is the GnuPG Mailing List administrator?
* Stefan Claas via Gnupg-users: > I would like to contact the admin of the GnuPG Mailing List, > for a proposal, but could not find the contact email address. Mailman 2.1, which is the software managing this mailing list, adds a footer to every message. The link in that footer should get you started, as should a search for "mailman list owner address". -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Proposal - variable line width for ASCII armor output
* Stefan Claas: > It should be noted that a fixed-width font would not help in this case, > because with my proposal we are talking about a line-length paramter. Making lines shorter to fit a vertical smartphone display? Or wider for horizontal displays? For whatever functional purpose? The key data is meant to be consumed by software, not to be visually pleasing to humans. I dare say you won't be able to convince me that your idea is beneficial in any way. ;-) -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Proposal - variable line width for ASCII armor output
* Stefan Claas: > I am aware of fixed-with fonts, but modern messengers or social media > do not use them. I deliberately don't use "social" media, nor do I care about it. Also, if a modern messenger (whatever you may label as such) is not supporting fixed-width fonts, that's the messenger's fault, not something to be remedied by changing GnuPG. > I guess Werner would only need a very very short time to implement > this feature among the many many many other commands and parameters > GnuPG has already accumulated over the years. :-) Any change requires design, development and testing. In the case of GnuPG across platforms. That is why I consider your specific proposal a complete waste of resources -- which is not meant as critique of you as a person. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Proposal - variable line width for ASCII armor output
* Stefan Claas via Gnupg-users: > The reason why I ask, I often see postings on social > media sites and the output there looks horrible, IMHO. Fixed-width fun should do the trick. Besides, the ASCII armor format is meant to facilitate transporting key data in email, not to look pretty. Personally, I'd rather not see valuable developer time squandered on a purely aesthetic feature. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How to create an authinfo.gpg encrypted file with a GitHub token
* John Stevenson: > This file would be used by Emacs to talk to GitHub via its API. While "used by Emacs" is quite unspecific and I possibly misunderstand your requirements, it suggests searching for "emacs gpg". Doing so returns many hits for Easy PG, so that might be a good place to start. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Revoking a Lost Key
* Mark: > Is there anyway to revoke an OLD LOST PGP key? I no longer have either > the public or private keys but can find the KeyID. As you guessed, it is not possible, because you require the private key in order to create a revocation. That's why it is recommended to create revocations (and storing them safely and separately) right after creating new keys, just for the case you describe, i.e. not having access to the original key material later on. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Syncing GnuPG data between computers
* Steve McKown via Gnupg-users: > I currently only manage one GnuPG identity, and its private key > material is stored on a smart card (Yubikey). So I think I'm only > caring about other's keys, trust relationships, and the like. If you can limit yourself to modifying files on only one computer before a "sync", I recommend using Git pull/push operations for your key rings, trust-DB etc. I have been using this method for a long time to sync macOS and Linux, and it works fine for me. The PGP files are binary and therefore opaque, but apparently platform-independent. -Ralph ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users