Re: Safe decryption with GnuPG?

2008-02-14 Thread Janusz A. Urbanowicz
On Wed, Feb 13, 2008 at 11:41:53AM +0100, Krzysztof Żelechowski wrote: > > Dnia 12-02-2008, Wt o godzinie 11:59 +0100, Anders Breindahl pisze: > > Hello, > > > > On 200802010958, Krzysztof Żelechowski wrote: > > > 1. The decrypted information must not make it to any persistent medium > > > > Us

Re: SMIME vs PGP

2008-02-06 Thread Janusz A. Urbanowicz
On Wed, Feb 06, 2008 at 03:28:49PM -0600, [EMAIL PROTECTED] wrote: > I am not a encryption expert, and need some help from the GnuPG user group. That's why we are here. > We have a new software product that has the capability of encrypting > documents using SMIME. How common is SMIME and used o

Re: How true can this be?

2008-01-28 Thread Janusz A. Urbanowicz
On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > - Original Message > Subject: Re: How true can this be? > From: Janusz A. Urbanowicz <[EMAIL PROTECTED]> > To: Raygene <

Re: How true can this be?

2008-01-27 Thread Janusz A. Urbanowicz
On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote: > > While discussing GnuPG on MacNN forum, someone posted the following message: > > Tonight I met this guy who works for an internet security company. they help > governments/law agencies, what he told me is so depressing. apparently, big

Re: Printing Keys and using OCR (was: Proofreadable base64)

2007-09-21 Thread Janusz A. Urbanowicz
On Fri, Sep 21, 2007 at 01:48:02PM +0700, Brian Smith wrote: > Peter Palfrader wrote: > > Nice idea. When trying to find decent backup methods for my > > new Tor identity key I cam accross this thread. > > > > I played all day with ocr and friends. In the course I wrote > > a small script that

Re: Questions about generating keys

2007-08-23 Thread Janusz A. Urbanowicz
On Thu, Aug 23, 2007 at 12:40:02PM +0300, Oskar L. wrote: > Robert J. Hansen wrote: > > In the battle between armor and warhead, _always_ bet on the warhead. > > > > Playing defensively and trying to make an email address invisible is > > going to be an exercise in frustration. They always get see

Re: Questions about generating keys

2007-08-22 Thread Janusz A. Urbanowicz
On Wed, Aug 22, 2007 at 03:34:50PM -0500, John Clizbe wrote: > > Alex wrote: > >> Yes, common sense. if you submit your key to a keyserver, there > >> should be some way to distinguish your key from hundreds of > >> other having the same short name, when searching for a key. > > > > Sorry, I for

Re: Questions about generating keys

2007-08-22 Thread Janusz A. Urbanowicz
On Wed, Aug 22, 2007 at 01:06:18PM +0300, Oskar L. wrote: > I'm about to generate a new keypair, and got a few questions. > > I have many e-mail addresses and change them frequently, and therefore I > don't want to have one in my public key. (Also because I'm afraid of > getting spam.) I think thi

Re: OpenPGP and usability

2007-08-10 Thread Janusz A. Urbanowicz
On Wed, Aug 08, 2007 at 10:51:15AM +0200, Werner Koch wrote: > In this regard Thunderbird is no better than Outlook! At least Thunderbird openly invites plugins and Enigmail is a good one. A. -- JID: [EMAIL PROTECTED] PGP: 0x46399138 od zwracania uwagi na detale są lekarze, adwokaci, programiśc

Re: RSA 1024 ridiculous

2007-06-19 Thread Janusz A. Urbanowicz
On Sun, Jun 17, 2007 at 01:02:58PM -0500, Andrew Berg wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: RIPEMD160 > > Atom Smasher wrote: > > gpg does support RSA-2048/SHA-256 (or even RSA-4096/SHA-512) which > > is what i've been using for a while now. i'll sign this email with > > RSA-2048/

Re: GnuPG for a small company -- Questions before I start

2007-05-17 Thread Janusz A. Urbanowicz
On Wed, May 16, 2007 at 08:08:02PM +0800, Jim Berland wrote: > Hello everybody, > > I am going to try to set up GPG for our small company (about 15 > people) and would like to ask you guys for some help. Following I will > write down my thoughts on this, that I had so far. Comments would be > high

Re: Extra key best solution for very insecure locations?

2007-05-08 Thread Janusz A. Urbanowicz
On Mon, May 07, 2007 at 04:27:55PM +0800, Jim Berland wrote: > Hello everybody, > > I'm trying to find the best solution for using GPG on a USB drive > while travelling. > > I read the FAQ about subkeys which suggests to only use subkeys on > insecure computers. As far as I understand this, thoug

Re: need a lot of entropies - help me pls :)

2007-05-06 Thread Janusz A. Urbanowicz
On Sat, May 05, 2007 at 09:03:02PM +0200, Piotr Firlej wrote: > On 5/5/07, Philipp Gühring <[EMAIL PROTECTED]> wrote: > >Hi, > Hi, thanks for reply, > > >Here you have a list of random number generators that are available on the > >market: > >http://www.cacert.at/cgi-bin/rngresults > > Nice list,

Re: Quantum computing

2007-04-20 Thread Janusz A. Urbanowicz
On Fri, Apr 20, 2007 at 01:57:46PM +0200, Anders Breindahl wrote: > Saying that ``there is no such thing'' seems harsh and as if you ignore > reality. The European Union put its hopes up for implementing a > ``quantum cryptography'' network of communications. That sort of makes > the term real in

Re: Secret key holder identity

2007-02-23 Thread Janusz A. Urbanowicz
On Thu, Feb 22, 2007 at 09:23:00AM +0100, Werner Koch wrote: > On Tue, 20 Feb 2007 18:02, [EMAIL PROTECTED] said: > > > If the system was designed for the real world, the encrypted message > > would, by default, consist of a binary data set, indistingushable from a > > random stream, until and unl

Re: Secret key holder identity (was: Local file encryption)

2007-02-20 Thread Janusz A. Urbanowicz
On Mon, Feb 19, 2007 at 10:54:17AM -0800, NikNot wrote: > On 2/19/07, Adam Funk <[EMAIL PROTECTED]> wrote: > >Is there any reason to physically secure your *public* keyring in > >... (Well, I suppose you might want to hide your secret identity!) > > Unfortunately, the whole GPG, with WebOfTrust c

Re: Local file encryption

2007-02-19 Thread Janusz A. Urbanowicz
On Mon, Feb 19, 2007 at 09:21:56AM -0500, [EMAIL PROTECTED] wrote: > I have been using gpg to encrypt/decrypt files on my computer "for my > eyes only". I have been using my public/private keypair on my keyring > to do so. I just discovered that I can use encrypt/decrypt local > files using a sy

Re: Sending Public Key

2007-02-13 Thread Janusz A. Urbanowicz
On Mon, Feb 12, 2007 at 12:53:38PM -0700, jason heddings wrote: > Thanks for the reply (and keeping me from making a big mistake)... > > So, for doing basic data encryption / transmission, what's the right way to > go? We just need to do public key encryption, send the data (via email or > postal

Re: Sending Public Key

2007-02-11 Thread Janusz A. Urbanowicz
On Sat, Feb 10, 2007 at 02:13:42PM -0700, jason heddings wrote: > I'm making use of libgcrypt for a specific encryption application. I'm > assuming that the following is secure: > > - Use libgcrypt to create a keypair > - Save the S-exp to an internal, protected keystore > - Base64 encode the pu

Re: Keyrings for websites

2007-02-08 Thread Janusz A. Urbanowicz
On Thu, Feb 08, 2007 at 05:32:30PM +0100, B??r Kessels wrote: > Hello, > > Op donderdag 8 februari 2007 15:36, schreef Joseph Oreste Bruni: > > You might want to check out "Domain Keys" which is used to   > > authenticate email sessions between MTA's. > > > > Also, peer-to-peer authentication can

Re: OpenPGP Card implementation

2006-11-17 Thread Janusz A. Urbanowicz
On Fri, Nov 17, 2006 at 02:17:50AM +0100, Johan Wevers wrote: > Janusz A. Urbanowicz wrote: > > >Do you mean that if I did get some VC funding for design of open > >crypto smartcard targeted for OpenPGP use and then published it (as a > >part of the business plan) I w

Re: OpenPGP Card implementation

2006-11-15 Thread Janusz A. Urbanowicz
On Tue, Nov 14, 2006 at 05:49:00PM +0100, Werner Koch wrote: > On Tue, 14 Nov 2006 13:06, [EMAIL PROTECTED] said: > > > Is it very hard to design such a card from scratch, and very expensive > > to have it produced as custom hardware? I'm sure there are enough > > chip-producing companies in China

Re: Don't store your key on a flash drive! [was Re: GnuPG (GPG) Problem]

2006-08-21 Thread Janusz A. Urbanowicz
On Sun, Aug 20, 2006 at 09:18:13AM -0500, Robert J. Hansen wrote: > Ismael Valladolid Torres wrote: > > A smartcard is very convenient as far as it's a multi application > > device, so you can store much other info apart from GnuPG keys, > > i.e. Mozilla passwords or such. > > ... I'm sorry, I'm s

Re: Multiple recipients

2006-08-21 Thread Janusz A. Urbanowicz
On Fri, Aug 18, 2006 at 03:09:43PM -0500, Brian Rosenvinge wrote: > We have decided to decrypt using a "special" user and re-encrypt the > file to multiple users. Our concern is that unless we want to do this > manually it has to be scripted and that will require the "special" > user's passphra

Re: How to verify the file was successfully encrypted...

2006-07-14 Thread Janusz A. Urbanowicz
On Wed, Jul 12, 2006 at 10:59:52AM -0600, Benny Helms wrote: > On Wed, 2006-07-12 at 12:25 +0200, Janusz A. Urbanowicz wrote: > > On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote: > > > What is your actual threat model here? > > > > The simplest answer

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Janusz A. Urbanowicz
On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote: > Hi folks. > > I've read the man page. I've read the FAQ's. I'm not seeing what I'm > looking for. > > Using something like "zip", you can use a -T to test the integrity of > the file. Note: this is not testing that nobody has alter

Re: Exporting keys as seperate files

2006-06-12 Thread Janusz A. Urbanowicz
On Sun, Jun 11, 2006 at 07:48:25PM +0300, Oskar L. wrote: > Hello, > > I'd like to export all public keys in my keyring to seperate ASCII-armored > files, using the name from the user ID as the filname, and adding ".asc" > as the extension. If a key has multiple user IDs, then the name from the >

Re: sign and encrypt

2006-06-07 Thread Janusz A. Urbanowicz
On Mon, Jun 05, 2006 at 11:41:01PM +0200, [EMAIL PROTECTED] wrote: > I have seen in the spec rfc3156 that a message should be signed and > then encrypted, but hypothetically if send a message to someone I do > not like and sign it and then encrypt it he/she can forward it to > someone else pretendi

Re: Signing vs. encrypting was: Cipher v public key

2006-06-02 Thread Janusz A. Urbanowicz
On Thu, Jun 01, 2006 at 11:33:14AM -0400, [EMAIL PROTECTED] wrote: > Todd Zullinger tmz at pobox.com wrote on > Thu Jun 1 11:46:48 CEST 2006 : > > > While I prefer gnupg to pgp myself, I did just happen to see a > > reference to pgp command line today > > the cost is *astronomical* > > have play

Re: Signing vs. encrypting was: Cipher v public key.

2006-06-01 Thread Janusz A. Urbanowicz
On Wed, May 31, 2006 at 01:59:37PM +0100, David Gray wrote: > Will suggest to the customer that we use signed & encrypted > transmissions. The only Issue we then have is that they wish to be > custodians of the private key, There is no need for them, from the cryptography point of view. Using p

Re: Upgrading from 1.2.1 to 1.4.4

2006-05-11 Thread Janusz A. Urbanowicz
On Wed, May 10, 2006 at 09:56:16PM +0200, Johan Wevers wrote: > David Shaw wrote: > > >There should be no special steps to take. Aside from the obvious > >steps of making a backup and testing that your environment still does > >what you want it to do, you can just install 1.4.3 on top of 1.2.1. >

Re: Rijndael usage

2006-05-11 Thread Janusz A. Urbanowicz
On Wed, May 10, 2006 at 09:09:03AM +0100, David Gray wrote: > Hi David, > Thanks for the info, even if it's not what I wanted to hear. :-) > > What do you mean by "raw Rijndael"? raw binary algorithm data not enveloped with any metadata (file format) From the code it is either raw binary

Re: Is there any GnuPG version which works with Windows Mobile 5.0?

2006-03-29 Thread Janusz A. Urbanowicz
On Tue, Mar 28, 2006 at 02:09:36PM -0500, John W. Moore III wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Remco Post wrote: > > > since the xscale cpu found in most wm 5.0 devices is in no way > > compatible with an ia32 (eg pentium) cpu, this is nonsense. There is > > some effor

Re: encrypted mail and gmail / remote

2006-03-23 Thread Janusz A. Urbanowicz
On Wed, Mar 22, 2006 at 05:43:03PM -0800, D_C wrote: > hello group - > > apologies for the newbie questions. > > i am wondering if there are any webmail services that can decrypt > email, if i somehow inform of my PGP key? > > also, i am travelling without knowing my pgp key. is this somehow > c

Re: Necessity of GPG when using SSL

2006-02-27 Thread Janusz A. Urbanowicz
On Fri, Feb 24, 2006 at 06:06:17AM -0500, Henry Hertz Hobbit wrote: > Benjamin Esham <[EMAIL PROTECTED]> wrote: > > >On Feb 22, 2006, at 6:22 AM, Janusz A. Urbanowicz wrote: > > > >> And there is really no point in ecryptiong the whole access since the > >&g

Re: Necessity of GPG when using SSL

2006-02-23 Thread Janusz A. Urbanowicz
On Wed, Feb 22, 2006 at 10:38:19AM -0500, Benjamin Esham wrote: > On Feb 22, 2006, at 6:22 AM, Janusz A. Urbanowicz wrote: > > >And there is really no point in ecryptiong the whole access since the > >contents, the emails usually travel the rest of the net unencrypted. > Bu

Re: Necessity of GPG when using SSL

2006-02-22 Thread Janusz A. Urbanowicz
On Tue, Feb 21, 2006 at 07:52:26AM -0500, Henry Hertz Hobbit wrote: > Johan Wevers wrote: > > >Henry Hertz Hobbit wrote: > > > >>Usually, if you are using a web interface to access your email, only the > >>initial authentication is done via SSL. After that if your URL address > >>shifts to using

Re: Remote signing?

2006-02-19 Thread Janusz A. Urbanowicz
On Sun, Feb 19, 2006 at 06:07:56AM +0100, Matthias Urlichs wrote: > Hello, > > I need to sign files remotely. They're moderately large, so transmitting > them back to my firewalled-off laptop (I'm usually behind a slow line), > where the secret key lives, isn't a good idea. create (and rotate fre

Re: Necessity of GPG when using SSL

2006-02-15 Thread Janusz A. Urbanowicz
On Tue, Feb 14, 2006 at 10:34:38PM +0100, Jim Berland wrote: > Hi everybody, > > I understand the use of GPG end-to-end-encryption and use it with a > few of my contacts. What I want to make sure is the following. > > I am going to move to China for some time. My email ISP is located > outsid

Re: gpg on cron task

2006-02-08 Thread Janusz A. Urbanowicz
On Sat, Feb 04, 2006 at 12:13:45AM -0500, Atom Smasher wrote: > On Sat, 4 Feb 2006, enediel gonzalez wrote: > > > === > > why are you using php for a cron job? many people deploy PHP cron scripts because thats the only language they know (which is probably the case) on one of such o

Re: hard-copy backups

2006-01-06 Thread Janusz A. Urbanowicz
On Thu, Jan 05, 2006 at 02:07:17PM -0500, Atom Smasher wrote: > On Thu, 5 Jan 2006, Janusz A. Urbanowicz wrote: > > >from my experience, all keys for long-term, _safe storage_ (and after > >revocation) should be kept with no passphases at all > > > >human memory

Re: hard-copy backups

2006-01-05 Thread Janusz A. Urbanowicz
On Thu, Jan 05, 2006 at 12:21:00AM -0500, Atom Smasher wrote: > has anyone given any thought to what would be the difference between > carefully and carelessly making hard-copy backups of secret keys? > > i mean, it would be stupid to print a copy of ones secret key (with a weak > passphrase) an

Re: PK-Encrypt-only

2005-12-01 Thread Janusz A. Urbanowicz
On Wed, Nov 30, 2005 at 08:33:07AM -0700, Kurt Fitzner wrote: > I am contemplating a change to my GnuPG Explorer Extension, but I need > some background information. > > I know that encrypting a file without signing it is commonly done with > symmetrical encryption. My question is, do people com

Re: No Debian package for 1.4.2

2005-09-09 Thread Janusz A. Urbanowicz
On Fri, Sep 09, 2005 at 11:32:21AM +0930, Roscoe wrote: > I imagine it's because stable is frozen. Hence only fixes will get in > - and not new vewsions. > (I maybe wrong on that.) > (Naturally that only applies to stable..) > > Building and installing your own gnupg.deb from gnupg.org sources ha

Re: OpenPGP Card

2005-09-07 Thread Janusz A. Urbanowicz
On Wed, Sep 07, 2005 at 08:02:56PM +0930, Alphax wrote: > > Not true. The OpenPGP card specification is a card application and > > you may put as many other applications on a card as you like and the > > EEPROM allows to. With 6k (and even less possible) it is actually a > > pretty small applica

Re: OpenPGP Card

2005-09-06 Thread Janusz A. Urbanowicz
On Wed, Sep 07, 2005 at 01:02:52AM +0930, Alphax wrote: > Is it possible to arbitrarily make an OpenPGP key with whatever keypair? There is no software that would do this right now, but assuming this is a actual RSA keypair, yes. Why not? Alex -- mors ab alto 0x46399138 ___

Re: OpenPGP Card

2005-09-06 Thread Janusz A. Urbanowicz
On Tue, Sep 06, 2005 at 11:48:45PM +0930, Alphax wrote: > > The application is free to do whatever it wants with these objects, > > given sufficient authentication to the card (PIN). Technically, there is > > nothing CA can do to prevent you to use your X.509 keys as OpenPGP keys. > > I think I mi

Re: validate_key_list failed

2005-08-09 Thread Janusz A. Urbanowicz
On Mon, Aug 08, 2005 at 12:33:07PM +0300, Peter Pentchev wrote: > On Fri, Aug 05, 2005 at 04:15:47PM +0200, Thomas Klausner wrote: > > Hi! > > > > After adding some keys recently, I always get: > [snip] > > gpg: mpi larger than indicated length (2 bytes) > > gpg: keyring_get_keyblock: read error: i

Re: "--for-your-eyes-only"

2005-06-30 Thread Janusz A. Urbanowicz
On Wed, Jun 29, 2005 at 07:16:59PM +0200, Werner Koch wrote: > On Wed, 29 Jun 2005 16:54:39 +0200, Janusz A Urbanowicz said: > > > The aim of the secure viewer then was to make difficult to obtain eyes-only > > message text as a file or a pipe. It checked if output is a live tt

Re: "--for-your-eyes-only"

2005-06-29 Thread Janusz A. Urbanowicz
On Wed, Jun 29, 2005 at 04:36:53PM +0200, Werner Koch wrote: > On Wed, 29 Jun 2005 10:55:02 +0200, Janusz A Urbanowicz said: > > > Some form of secure viewer was present in PGP 2.3 and 2.6 which were FLOSS. > > Huh, that's new to me. Both versions are pure command

Re: "--for-your-eyes-only"

2005-06-29 Thread Janusz A. Urbanowicz
On Tue, Jun 28, 2005 at 04:58:52AM -0400, Charly Avital wrote: > > However, GnuPG can call other programs to do other tasks (keyserver > > access programs, JPEG viewers for photo IDs), so it's not impossible > > that GnuPG could call an external secure viewer program. I don't know > > of one offh

Re: How to create self-extracting executable?

2005-03-24 Thread Janusz A. Urbanowicz
On Thu, Mar 17, 2005 at 03:02:11PM -0500, Matthew Wilson wrote: > My office uses PGP to create self-extracting executable files. [] > Is this feature possible with GPG? I'm trying to automate lots of > processes and the less highlighting and right-clicking I have to do in > Windows Explorer, the b

signature level

2005-03-21 Thread Janusz A. Urbanowicz
How is signature level specification done in 1.4+? Alex -- mors ab alto 0x46399138 ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users