On 2009-08-13, David SMITH wrote:
So the people who come on gnupg-users asking for help because they've
forgotten their passphrase or accidentally deleted their ~/.gnupg
directory don't exist?
I guess that's a new way of replying to them: You don't exist.
Not forgetting the possibility of
On 2008-11-03, David Shaw wrote:
Rather offtopic, but I read an interesting paper on seals a while back
(I'm afraid I don't recall where offhand). Seals never really assured
confidentiality. A person who wanted to open a letter would just make
a mold of the seal, melt it free, read the
[Note: I posted this to the Ubuntu-users list recently too. Apologies
to those who have already seen it.]
I have a strange problem with seahorse not working on only one of two
Ubuntu computers. The gpg-agent works in the curses-like way when I
call gpg in xterm, but seahorse doesn't. (Because
I have a strange problem with seahorse not working on only one of two
Ubuntu computers. The gpg-agent works in the curses-like way when I
call gpg in xterm, but seahorse doesn't. (Because seahorse isn't
working but Thunderbird enigmail detects the agent running, Enigmail
doesn't work either.)
I work with ssh-agent using ssh-add from the command line: ssh-add
key0 key1 key2 to activate keys (sometimes with -t to set a time
limit), and ssh-add -d key1 or ssh-add -D to deactivate them.
Is there a similar way to work with gpg-agent?
___
On 2007-02-19, John Clizbe wrote:
The passphrase is only one protection on your keypair and it's
pretty much the protection of last resort - given an easily
guessable/brute-forced passphrase, it's Game-Over. if an attacker
gets access to the keyring files. Another protection is to
physically
Consultation on the Investigation of Protected Electronic Information
under RIPA
The Home Office has issued a consultation on a revised draft statutory
code of practice on investigation of protected electronic data data,
which relates to the exercise and performance of the powers and duties
that
On 2006-06-05, Zach Himsel [EMAIL PROTECTED] wrote:
Hello,
I am using Thunderbird with the Enigmail extension. It gets annoying
to me to have to enter in my password every time I want to send a
signed (every email) or encrypted (only some) email. Sure, it saves it
for 5 minutes idle time,
On 2006-05-15, Ingo Klöcker [EMAIL PROTECTED] wrote:
(Two apologies: this is slightly off-topic, and I've also posted the
same question to the debian-user list.)
You should have tried [EMAIL PROTECTED] :-)
I'll try that next, thanks!
I'm running the Debian kmail 3.3.2-3 package and gpg
On 2006-05-16, Werner Koch [EMAIL PROTECTED] wrote:
Adam Funk [EMAIL PROTECTED] writes:
Is there any way to override this restriction?
It is not a restriction but a requirement.
I'm not sure what you mean. Thunderbird (for example) lets the user
designate unsigned keys for recipients
On 2006-05-16, Werner Koch [EMAIL PROTECTED] wrote:
Adam Funk [EMAIL PROTECTED] writes:
I'm not sure what you mean. Thunderbird (for example) lets the user
designate unsigned keys for recipients in the address book and encrypt
to them.
It is up to the MUA on how to handle
(Two apologies: this is slightly off-topic, and I've also posted the
same question to the debian-user list.)
I'm running the Debian kmail 3.3.2-3 package and gpg 1.4.3 compiled
from the source.
As far as I can tell, it flatly refuses to let me encrypt a message to
any key that doesn't have a
On 2006-04-10, Alphax [EMAIL PROTECTED] wrote:
David Shaw wrote:
On Sun, Apr 09, 2006 at 06:16:14PM -0400, John A. Martin wrote:
ds == David Shaw
Re: auto-key-locate pka (gpg version 1.4.3)
Sat, 8 Apr 2006 20:11:48 -0400
ds This means that the build of GnuPG you has no DNS support (pka
On 2006-04-10, David Shaw [EMAIL PROTECTED] wrote:
No. There is no compile-time question whether enarmor exists or not.
It just exists. If you want a list of all keywords that GnuPG
understands, use gpg --dump-options.
Isn't that an undocumented option too? I've just tried gpg --help
|grep
Should I be confident about using gpg's return code 0 in a script (run
automatically by at or cron) to make encrypted backups? Example:
cd /backup/directory
tar cf user1.tar /home/user1
gpg -er 0x01234567 user1.tar rm user1.tar
Thanks,
Adam
___
Date: Tue, 21 Jun 2005 09:11:51 -0400
From: David Shaw [EMAIL PROTECTED]
I recently created a new subkey for a keypair that I use on two
machines, but I cannot get the subkey onto the second machine. I
have tried gpg --export, --export-secret and --export-secret-subkey
on the first
It applies to the master key only. You do not need to generate a new
revocation certificate. Revoking the master key takes out all UIDs
and subkeys in one step.
That's what I suspected.
Thanks,
Adam
___
Gnupg-users mailing list
When I created my keypair I dutifully created and safely stored a
revocation certificate for it.
I recently added a new subkey and revoked the old subkey (as discussed
on this list). I've also added and revoked a few UIDs since the key
was created.
Is there any reason to generate a new
18 matches
Mail list logo