Re: Key distribution via NFC

2014-07-06 Thread The Fuzzy Whirlpool Thunderstorm
It seems that APG and OpenKeychain on Android supports GPG key exchange via NFC just like BBM pin exchange via QRcode. pgp8ZNOhdJvvE.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinf

Re: GPG's vulnerability to quantum cryptography

2014-07-06 Thread The Fuzzy Whirlpool Thunderstorm
Using GPG encryption is still good, although it's vulnerable to quantum cryptodecryption. It's a good idea to set an expiration for each of your GPG key. So that, when the expiration time comes, you'll be able to generate a new GPG key to address a possibility of your old keys being cracked. GPG i

Re: Key distribution via NFC

2014-07-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Friday 4 July 2014 at 6:24:53 AM, in , Robert J. Hansen wrote: > NFC is significantly more convenient than > fumbling with your phone's camera app, taking a > snapshot, etc. Wave it and it's done. NFC has some > interesting human interface

Re: GPG's vulnerability to quantum cryptography

2014-07-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Sunday 6 July 2014 at 8:36:05 AM, in , The Fuzzy Whirlpool Thunderstorm wrote: > Using GPG encryption is still good, although it's > vulnerable to quantum cryptodecryption. It's a good > idea to set an expiration for each of your GPG key. S

Re: GPG's vulnerability to quantum cryptography

2014-07-06 Thread Johan Wevers
On 06-07-2014 9:36, The Fuzzy Whirlpool Thunderstorm wrote: > Using GPG encryption is still good, although it's vulnerable to quantum > cryptodecryption. > It's a good idea to set an expiration for each of your GPG key. > So that, when the expiration time comes, you'll be able to generate a > new

Re: GPG's vulnerability to quantum cryptography

2014-07-06 Thread Robert J. Hansen
On 7/6/2014 3:36 AM, The Fuzzy Whirlpool Thunderstorm wrote: > Using GPG encryption is still good, although it's vulnerable to > quantum cryptodecryption. In point of fact, we don't know this. Theoretically, science-fiction level breakthroughs in quantum computation would break RSA. But the prob

Re: Key distribution via NFC

2014-07-06 Thread NdK
Il 04/07/2014 05:54, Robert J. Hansen ha scritto: > If someone asks you for your certificate, you don't have to > trade a SHA-1 fingerprint -- just put down your keychain and let the > person wave a cell phone over it. Just place in the tag the URL where to retrieve your key. > Obviously there ar

Encrypt directly to keyfile

2014-07-06 Thread Matthias Fischer
Hi folks, I already asked the question here about half a year ago, but IIRC didn't get any reaction: Imagine you have a file containing one or more PGP-Public-Keys, and you want to encrypt something for this key, without adding the key to your public keyring. Is there some commandline option to

Re: Encrypt directly to keyfile

2014-07-06 Thread Hauke Laging
Am So 06.07.2014, 23:18:20 schrieb Matthias Fischer: > I can achieve something similar, by using: > $ gpg --no-default-keyring --keyring /tmp/keyring.once --import > $ gpg --no-default-keyring --keyring /tmp/keyring.once > --trust-model always --recipient -e > > But this requires an additional

Re: GPG's vulnerability to quantum cryptography

2014-07-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Sunday 6 July 2014 at 3:25:57 PM, in , Johan Wevers wrote: > Since I don't know when I will consider a key > compromised or weak, I don't work with expiry dates but > revoke the key in such a case. I don't know quite what /The Fuzzy Whirl

Re: Encrypt directly to keyfile

2014-07-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Sunday 6 July 2014 at 10:18:20 PM, in , Matthias Fischer wrote: > I can achieve something similar, by using: > $ gpg --no-default-keyring --keyring /tmp/keyring.once > --import > $ gpg --no-default-keyring --keyring /tmp/keyring.once > --

Re: howto revoke a key that has no secret key

2014-07-06 Thread eMyListsDDg
> Am Di 01.07.2014, 09:29:57 schrieb eMyListsDDg: >> somehow i managed to send a key id to a key server that has no >> secret-key. so i would like to remove it. >> gpg --output keyrevoke.asc --gen-revoke 0x >> doesn't work since there is no secret key. >> at a loss as to how to remove/revoke t