Fwd: [Full-disclosure] Introducing TGP...

2010-06-15 Thread M.B.Jr.
Hello, there's this guy, named Timothy Mullen who recently released this TGP (Thor’s Godly Privacy) encryption utility for the cloud. Timothy wrote (note that his complete text goes forwarded below): ... I designed TGP with “encryption for the cloud” in mind.  That means that not only does TGP

DRM -- digital rights management

2010-04-12 Thread M.B.Jr.
Hi, I have this simple question (sorry for it), regarding digital rights management. As I understand, DRM in essence is the use of asymmetric cryptography, which turns simple public keys into not-publicly-available public keys. Is it correct? Regards, Marcio Barbado, Jr.

Re: Secure unattended decryption

2010-03-19 Thread M.B.Jr.
Hi Daniel, On Thu, Mar 18, 2010 at 8:50 AM, Daniel Eggleston egg...@gmail.com wrote: I know it's sort of a contradiction in terms, but hear me out: The case I'm looking at is a High Availability environment hosting a database. The database is comprised of many Unix files, encrypted via AES,

Re: How to use an offline primary key

2010-01-04 Thread M.B.Jr.
Hi list, I wish a great 2010 year for everybody! On Sat, Jan 2, 2010 at 11:09 AM, Sven Radde em...@sven-radde.de wrote: Hello GnuPG-Users! With a new year comes a new keypair and this time I tried to use subkeys to separate my secret primary key from the day-to-day encryption/signing keys.

same key pair for more than one e-mail address

2009-12-18 Thread M.B.Jr.
Suppose I'd like to bind the same key pair to more than one e-mail address. Is it recommended? Any comments will be greatly appreciated. Regards, Marcio Barbado, Jr. ___ Gnupg-users mailing list Gnupg-users@gnupg.org

Re: GnuPG private key resilience against off-line brute-force attacks (was: Re: Backup of private key)

2009-11-28 Thread M.B.Jr.
Hi, On Sat, Nov 28, 2009 at 1:47 PM, David Shaw ds...@jabberwocky.com wrote:   The question is: what does GnuPG or OpenSSH do to slow down password brute-force? I mean does the password derivation function use some iterations? If so how many? Can I configure them? I guess so but I couldn't

Re: digital signature primary key and encryption subkey

2009-11-18 Thread M.B.Jr.
Thanks again, David. The last dumb question, I promise, would be: how can I see my primary key and my subkey as well? On Wed, Nov 18, 2009 at 12:38 PM, David Shaw ds...@jabberwocky.com wrote: On Nov 18, 2009, at 8:49 AM, M.B.Jr. wrote: Hi David, On Wed, Nov 18, 2009 at 1:21 AM, David

digital signature primary key and encryption subkey

2009-11-17 Thread M.B.Jr.
Hi list, one lame confusion I'm facing now. I was reading GnuPG's Signing Subkey Cross-Certification page [1], and as a matter of fact, these two simple doubts did arise. Suppose one provides the command: gpg --gen-key and chooses the default DSA and Elgamal option. 1st doubt: DSA will be the

Re: Two tidbits of potential interest

2009-09-25 Thread M.B.Jr.
Hi Werner, On Fri, Sep 25, 2009 at 6:19 AM, Werner Koch w...@gnupg.org wrote: On Thu, 24 Sep 2009 21:13, marcio.barb...@gmail.com said: Is this a generic asymmetric premise? I mean: is it valid both to the (computational) Mathematics behind OpenPGP's and X.509's public keys' integers?

Re: Two tidbits of potential interest

2009-09-24 Thread M.B.Jr.
Hi David, about the first tidbit: On Tue, Sep 22, 2009 at 6:08 PM, David Shaw ds...@jabberwocky.com wrote: First of all, someone has factored a 512-bit RSA key (the one used to protect a TI programmable calculator, it seems).  It took 73 days on a dual-core 1900Mhz Athlon64.  It took just

Re: Two tidbits of potential interest

2009-09-24 Thread M.B.Jr.
On Thu, Sep 24, 2009 at 2:21 PM, David Shaw ds...@jabberwocky.com wrote: On Sep 24, 2009, at 12:30 PM, M.B.Jr. wrote: Hi David, about the first tidbit: On Tue, Sep 22, 2009 at 6:08 PM, David Shaw ds...@jabberwocky.com wrote: First of all, someone has factored a 512-bit RSA key (the one

Re: IDEA patent vs the recent USPTO memorandum

2009-09-21 Thread M.B.Jr.
Gentlemen, I really appreciate the comments you've made on the subject and the little debates as well. That was exactly what I was expecting. Sometimes, regular users do not have the proper notion of whether some functionality merits attention. All in all, it looks like IDEA, even if totally

IDEA patent vs the recent USPTO memorandum

2009-09-16 Thread M.B.Jr.
Hi list, I've recently had access to this document, written by the United States Patent and Trademark Office (USPTO) which basically tries to ban software patents. The memorandum is here: http://www.uspto.gov/web/offices/pac/dapp/opla/2009-08-25_interim_101_instructions.pdf the case is, I'm

Re: encrypting compression algorithms

2009-09-05 Thread M.B.Jr.
Hi David, thank you. On Sat, Sep 5, 2009 at 1:11 PM, David Shawds...@jabberwocky.com wrote: On Sep 4, 2009, at 12:53 PM, M.B.Jr. wrote: How do I know which compression algorithm was used? Unless you've overridden the default, it is ZIP. Ok but in this point, my doubt is about some

encrypting compression algorithms

2009-09-04 Thread M.B.Jr.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi list, when symmetrically encrypting a file, e.g.: $ gpg --output file.ods.gpg --symmetric file.ods the command above generates a gpg extension encrypted AND compressed file, is that correct? How do I know which compression algorithm was used?

2 local user-ids, 2 distinct key pairs but only 1 user-id can sign.

2009-08-18 Thread M.B.Jr.
Hi list, this is my first message here. Firstly, thank you Werner Koch and collaborators for such a superb software. More than an enthusiast on cryptography, I am a Brazilian citizen, concerned with the privacy and authenticity components involved in information exchange transactions (not only

Re: 2 local user-ids, 2 distinct key pairs but only 1 user-id can sign.

2009-08-18 Thread M.B.Jr.
this in your gpg.conf too). Even after looking at the man page, I'm not entirely clear what name the --local-user option is after (e.g. is it a name of a local user on the system, or is it the uid name on the key). Regards, Erik M.B.Jr. wrote: Hi list, this is my first message here