Re: Mainkey with many subkeys??

2014-12-12 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/12/14 15:15, Tomo Ruby wrote: > I really know only of this approach: The more encrypted/signed data I > spread over the web, the easier it might be for an attacker to calculate > the secret key. If this was advice directly relating to OpenPGP: D

Re: gpg / Enigmail behavior after disabling Gnome Keyring

2014-12-12 Thread Tobias Mueller
On Thu, Dec 11, 2014 at 02:11:22AM +0100, outa wrote: > Has anyone experienced the same problem and could point me to a solution? Not necessarily a solution, but a pointer to a discussion which took place: http://lists.gnupg.org/pipermail/gnupg-devel/2014-August/thread.html#28689 Cheers, Tobi

Re: 31C3, keysigning party

2014-12-12 Thread Tobias Mueller
Hi. On Thu, Dec 11, 2014 at 01:49:36PM +0100, Peter Lebbing wrote: > Probably monkeyscan from monkeysign... FWIW: A tool with a similar goal is GNOME Keysign: https://github.com/muelli/geysigning (Note that the repository will move, so this link will become defunct) Contrasting caff or monkeysign

Re: Mainkey with many subkeys??

2014-12-12 Thread Tomo Ruby
> Recommended by whom and against what threat model? And, really, the > same lifespan for signing keys as for encryption keys? To be honest I didn't think and search about that too much, but that was not the point anyways... > My take on the advice I have most often seen in previous > discussion