On Wed, 9 Oct 2013 01:09, sanv...@unex.es said:
> Sorry but I'm not a cryptographer. Do you mean that as far as there is
> not a known exploit, there is nothing to worry about?
No. A threat model is used to answer several questions for example:
"What do you want to protect against". In this ca
El 08/10/13 22:19, Werner Koch escribió:
On Tue, 8 Oct 2013 02:05, sanv...@unex.es said:
to get reasonable defaults. Is SHA-1 a reasonable default for key
signing?
It is the default becuase SHA1 one is a MUST algorithm for OpenPGP and
fingerprints are anyway compuyted using SHA1. SHA256 is
On Tue, 8 Oct 2013 02:05, sanv...@unex.es said:
> to get reasonable defaults. Is SHA-1 a reasonable default for key
> signing?
It is the default becuase SHA1 one is a MUST algorithm for OpenPGP and
fingerprints are anyway compuyted using SHA1. SHA256 is not supported
by all OpenPGP implementati
El 07/10/13 23:50, David Shaw escribió:
On Oct 7, 2013, at 6:52 AM, Santiago Vila wrote:
Package: gnupg
Version: 1.4.12-7+deb7u1
My current GPG key was created in 2009 and very shortly afterwards I
changed the digest preferences as explained here:
http://www.debian-administration.org/users/d
On Oct 7, 2013, at 6:52 AM, Santiago Vila wrote:
> Package: gnupg
> Version: 1.4.12-7+deb7u1
>
> My current GPG key was created in 2009 and very shortly afterwards I
> changed the digest preferences as explained here:
>
> http://www.debian-administration.org/users/dkg/weblog/48
>
> and reuploa
Package: gnupg
Version: 1.4.12-7+deb7u1
My current GPG key was created in 2009 and very shortly afterwards I
changed the digest preferences as explained here:
http://www.debian-administration.org/users/dkg/weblog/48
and reuploaded the key to the keyservers with the new preferences, namely:
Di
6 matches
Mail list logo