Hello,
there's this guy, named Timothy Mullen who recently released this TGP
(Thor’s Godly Privacy) encryption utility for the cloud.
Timothy wrote (note that his complete text goes forwarded below):
... I designed TGP with “encryption for the cloud” in mind. That
means that not only does TGP
Hi,
I have this simple question (sorry for it), regarding digital rights
management.
As I understand, DRM in essence is the use of asymmetric cryptography,
which turns simple public keys into not-publicly-available public
keys.
Is it correct?
Regards,
Marcio Barbado, Jr.
Hi Daniel,
On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston egg...@gmail.com wrote:
I know it's sort of a contradiction in terms, but hear me out:
The case I'm looking at is a High Availability environment hosting a
database. The database is comprised of many Unix files, encrypted via AES,
Hi list,
I wish a great 2010 year for everybody!
On Sat, Jan 2, 2010 at 11:09 AM, Sven Radde em...@sven-radde.de wrote:
Hello GnuPG-Users!
With a new year comes a new keypair and this time I tried to use subkeys
to separate my secret primary key from the day-to-day
encryption/signing keys.
Suppose I'd like to bind the same key pair to more than one e-mail address.
Is it recommended? Any comments will be greatly appreciated.
Regards,
Marcio Barbado, Jr.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Hi,
On Sat, Nov 28, 2009 at 1:47 PM, David Shaw ds...@jabberwocky.com wrote:
The question is: what does GnuPG or OpenSSH do to slow down
password brute-force? I mean does the password derivation function use
some iterations? If so how many? Can I configure them? I guess so but
I couldn't
Thanks again, David.
The last dumb question, I promise, would be:
how can I see my primary key and my subkey as well?
On Wed, Nov 18, 2009 at 12:38 PM, David Shaw ds...@jabberwocky.com wrote:
On Nov 18, 2009, at 8:49 AM, M.B.Jr. wrote:
Hi David,
On Wed, Nov 18, 2009 at 1:21 AM, David
Hi list,
one lame confusion I'm facing now.
I was reading GnuPG's Signing Subkey Cross-Certification page [1],
and as a matter of fact, these two simple doubts did arise.
Suppose one provides the command:
gpg --gen-key
and chooses the default DSA and Elgamal option.
1st doubt:
DSA will be the
Hi Werner,
On Fri, Sep 25, 2009 at 6:19 AM, Werner Koch w...@gnupg.org wrote:
On Thu, 24 Sep 2009 21:13, marcio.barb...@gmail.com said:
Is this a generic asymmetric premise?
I mean: is it valid both to the (computational) Mathematics behind
OpenPGP's and X.509's public keys' integers?
Hi David,
about the first tidbit:
On Tue, Sep 22, 2009 at 6:08 PM, David Shaw ds...@jabberwocky.com wrote:
First of all, someone has factored a 512-bit RSA key (the one used to
protect a TI programmable calculator, it seems). It took 73 days on a
dual-core 1900Mhz Athlon64. It took just
On Thu, Sep 24, 2009 at 2:21 PM, David Shaw ds...@jabberwocky.com wrote:
On Sep 24, 2009, at 12:30 PM, M.B.Jr. wrote:
Hi David,
about the first tidbit:
On Tue, Sep 22, 2009 at 6:08 PM, David Shaw ds...@jabberwocky.com wrote:
First of all, someone has factored a 512-bit RSA key (the one
Gentlemen,
I really appreciate the comments you've made on the subject and the
little debates as well.
That was exactly what I was expecting.
Sometimes, regular users do not have the proper notion of whether some
functionality merits attention.
All in all, it looks like IDEA, even if totally
Hi list,
I've recently had access to this document, written by the United
States Patent and Trademark Office (USPTO) which basically tries to
ban software patents.
The memorandum is here:
http://www.uspto.gov/web/offices/pac/dapp/opla/2009-08-25_interim_101_instructions.pdf
the case is,
I'm
Hi David, thank you.
On Sat, Sep 5, 2009 at 1:11 PM, David Shawds...@jabberwocky.com wrote:
On Sep 4, 2009, at 12:53 PM, M.B.Jr. wrote:
How do I know which compression algorithm was used?
Unless you've overridden the default, it is ZIP.
Ok but in this point, my doubt is about some
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi list,
when symmetrically encrypting a file, e.g.:
$ gpg --output file.ods.gpg --symmetric file.ods
the command above generates a gpg extension encrypted AND compressed
file, is that correct?
How do I know which compression algorithm was used?
Hi list,
this is my first message here.
Firstly, thank you Werner Koch and collaborators for such a superb software.
More than an enthusiast on cryptography, I am a Brazilian citizen,
concerned with the privacy and authenticity components involved in
information exchange transactions (not only
this in your gpg.conf too).
Even after looking at the man page, I'm not entirely clear what name
the --local-user option is after (e.g. is it a name of a local user on
the system, or is it the uid name on the key).
Regards,
Erik
M.B.Jr. wrote:
Hi list,
this is my first message here
17 matches
Mail list logo