-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Joseph Isadore Ziff wrote:
> I've been wanting to build gnupg2 to have the bin/executable name gpg
> instead of gpg2 but have so far been unsuccessful in tracking down exactly
> what bits of the source code need to be altered. I am running a linux i38
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all,
I've been using GnuPG for personal things for many years, but I've only
recently started to try to understand the "social" aspects, like signing
others' keys and the trust model. I have a bunch of basic questions that I
was hoping people here
Mica Mijatovic wrote:
Done!
A very nice fresh almost ultra modern logo I myself would like to
see on
my T-shirt (and I am very picky as to my T-shirts, just to mention,
willing not to wear just anything -- especially not on a dressy
evening
occasions), or as a badge or whatever a logo cou
On Feb 22, 2006, at 6:22 AM, Janusz A. Urbanowicz wrote:
And there is really no point in ecryptiong the whole access since the
contents, the emails usually travel the rest of the net unencrypted.
But wouldn't it be much easier for an attacker to intercept all of your
e-mail by listening in on
John Clizbe wrote:
Henry Hertz Hobbit wrote:
Usually, if you are using a web interface to access your email,
only the
initial authentication is done via SSL. After that if your URL
address
shifts to using an "http://"; rather than the "https://"; you made
your
initial connection with mea
Where can I find a fairly basic introduction to GPG concepts like trust
models and
signatures? I've been using GPG for personal use for five years, but
somehow missed
some of the more basic concepts. I took a look at the GPG Privacy
Handbook, but it
looks like it hasn't been updated for six ye