On 7/26/11 2:44 PM, Marcio B. Jr. wrote:
>> Are you aware that the purpose of OTR is to allow two parties to
>> communicate confidentially?
>
> Right now, I'm trying to study OTR within some US Fifth Amendment
> contexts. So I'll answer that in a later time.
It seems to be a straightforward yes o
Hi Daniel,
On Sat, Jul 23, 2011 at 2:21 PM, Daniel Kahn Gillmor
wrote:
> On 07/23/2011 07:04 PM, Marcio B. Jr. wrote:
>> On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen
>> wrote:
So far, OTR adoption seems unjustifiable, really. I mean, it uses the
Diffie-Hellman key exchange method
On 25 Jul 2011 at 20:12, Werner Koch wrote:
> For the v1 card you may want to have a look at the flylogic.net blog; they
> have lots of entries about different chips. There is no specific entry
> about the v1 card iirc, but I once sent them a few cards and they told me
> it would be easy to read
Depends where you keep the backup.
(Excuse the top post -- Android)
(Mobile/Handy)
Am 26.07.2011 16:29 schrieb "Werner Koch" :
On Tue, 26 Jul 2011 14:41, h...@qbs.com.pl said:
> The key is also useful for decrypting past commun...
Well, you should have a backup of the decryption key. It is ch
On Tue, 26 Jul 2011 14:41, h...@qbs.com.pl said:
> The key is also useful for decrypting past communication...
Well, you should have a backup of the decryption key. It is cheaper to
steal that backup than to crack the card.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen rege
On Tue, 26 Jul 2011 06:26, andrewinfo...@gmail.com said:
> When encrypting with --symmetric, I would expect to get asked for the
> password when decrypting but I am never prompted... why?
Run
gpgconf --reload gpg-agent
before decryption to clear the passphrase cache.
Salam-Shalom,
Werner
On Monday 25 of July 2011 17:45:16 Werner Koch wrote:
> As it is not
> possible to secretly read out the key you will almost always have the
> opportunity to revoke the key before a damage is possible.
The key is also useful for decrypting past communication...
Regards,
--
Hubert Kario
QBS - Qua
When encrypting with --symmetric, I would expect to get asked for the
password when decrypting but I am never prompted... why?
me$ gpg --symmetric --cipher-algo AES256 -v foo.txt
gpg: using cipher AES256
gpg: writing to `foo.txt.gpg'
me$ gpg foo.txt.gpg
gpg: AES256 encrypted data
gpg: encrypted