Werner Koch wrote:
On Mon, 29 Jan 2007 05:33, [EMAIL PROTECTED] said:
I have a key that will be imported into a system with no real-time
clock. On that machine, the system time gets set to the Epoch at
startup, thus the key always looks as though it was created 1169836499
Without
On Mon, Jan 29, 2007 at 12:18:18AM -0600, Robert J. Hansen wrote:
The thing is degree. Yes, keys are likely harvested. But I will
suggest you'll
get /much more/ SPAM from sending a message to this list than you
will from
publishing an email address on a key and sending it to a
On Mon, 29 Jan 2007 16:22, [EMAIL PROTECTED] said:
etc. Nowadays, many spammers aren't using their own bandwidth or CPU.
So why *not* hit the keyservers? It costs them essentially nothing.
OTOH, addresses taken from the addressbook as available on the host
(== zombie Windows PC) are much
On Sun, 28 Jan 2007 13:44, [EMAIL PROTECTED] said:
based upon v0.7.2. However, gpg2 will probably need patching so that it
behaves properly - see
http://www.py-soft.co.uk/~benjamin/download/mac-gpg/patch-query.diff
I don't like this. If you really need to be called by sh, pinentry
should
GnuPG 1.4.6 (from gnupg.org) on winxp pro sp2
gpg --edit-key PGP Global Directory Verification Key
Gives me this:
gpg (GnuPG) 1.4.6; Copyright (C) 2006 Free Software Foundation, Inc.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are
Werner Koch wrote:
I don't like this. If you really need to be called by sh, pinentry
should re-exec itself.
What is the reason that you need to be called by sh? I presume sh sets
some extra environment variables from a global configiration file.
Otherwise the application bundle isn't