Re:

2022-03-21 Thread Mark H. Wood via Gnupg-users
list > Gnupg-users@gnupg.org > https://lists.gnupg.org/mailman/listinfo/gnupg-users http://catb.org/~esr/faqs/smart-questions.html -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-2

Re: Key Management - BSI had send private key instead of public key

2021-11-18 Thread Mark H. Wood via Gnupg-users
t; > I guess that saves the day for some. I can almost hear the sigh of > relief. ;) :-) https://en.wikipedia.org/wiki/The_Story_of_English if anyone finds this interesting. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W.

Re: Off-topic: standards for embedded signing of digital images?

2021-09-10 Thread Mark H. Wood via Gnupg-users
On Thu, Sep 09, 2021 at 10:43:05AM +, Oli Kon via Gnupg-users wrote: > On 2021-09-08 4:53 p.m., Mark H. Wood via Gnupg-users - > gnupg-users@gnupg.org wrote: > > I didn't know where else to turn, for folks who might be able to point > > me at standards for or discuss

Off-topic: standards for embedded signing of digital images?

2021-09-08 Thread Mark H. Wood via Gnupg-users
I didn't know where else to turn, for folks who might be able to point me at standards for or discussion of embedding crypto signatures in image formats, to detect tampering with the image. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue Unive

Re: gpg-agent and X

2021-03-05 Thread Mark H. Wood via Gnupg-users
tly the qt one, gtk > was preferred with gtk2 but the gtk3 one is horrible.) The only thing I can think of to check is: have you selected pinentry-qt5 using 'eselect'? -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W

Re: Thunderbird / Enigmail / Autocrypt

2020-11-23 Thread Mark H. Wood via Gnupg-users
nny," except an occasional comment that someone couldn't open the "attachment" (meaning the PGP/MIME signature). Those stopped when I got a corporate X.509 certificate and configured Mutt to use S/MIME for internal mail. Other console MUAs probably can do similar things when c

Re: keys require a user-id

2020-05-21 Thread Mark H. Wood via Gnupg-users
d be user-hostile, as there are people in some > >> cultures who have only one name, the Indonesian dictator Suharto being one > >> famous example. > ___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-

Re: gmail smime, sends two messages one is not encrypted. Experience?

2019-12-10 Thread Mark H. Wood via Gnupg-users
key to the entity which will issue the certificate. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ulib.iupui.edu signature.asc Des

Re: gmail smime, sends two messages one is not encrypted. Experience?

2019-12-10 Thread Mark H. Wood via Gnupg-users
the number of places that the bad guy must break into and get out of undetected. This is the electronic analog of a principle in physical security: require the bad guy to spend time, make noise, and create a visible mess, to increase his fear of being discovered to the point that the expectation

Re: gmail smime, sends two messages one is not encrypted. Experience?

2019-12-10 Thread Mark H. Wood via Gnupg-users
I do have a question, if you don't mind ... > > > > > > Why are the Students at the University don't use OpenPGP with Gmail > > > via the free Mailvelope add-on for Firefox, Chrome? Wouldn't that be > > > not cheaper instead of purchasing a whole l

Re: Future OpenPGP Support in Thunderbird

2019-10-12 Thread Mark H. Wood via Gnupg-users
l certificates twice (once for Firefox, again for *everything else*.) Maybe there will be an add-on, so that those who care can choose to integrate Thunderbird into their systems rather than having it still standing off to one side haughtily awaiting special treatment. -- Mark H. Wood Lead T

Re: Essay on PGP as it is used today

2019-07-22 Thread Mark H. Wood via Gnupg-users
is almost absurdly simple: 1) Use PGP 2) Don't send secrets to people I don't trust to keep them. Anyway, 99% of my PGP use is for the opposite of secrecy: I sign my emails so that (if you care enough to install PGP) you can be highly assured that they're from me. -- Mark H.

Re: A Solution for Sending Messages Safely from EFAIL-safe Senders to EFAIL-unsafe Receivers

2018-05-30 Thread Mark H. Wood
We can't enforce technical security without proper OPSEC. Regarding the > > Subject, Reference, etc, it is way easy and more secure to educate the > > user about the fact that only the content is _end-to-end_ encrypted and > > other parts, like the Subject, are required to

Re: A postmortem on Efail

2018-05-22 Thread Mark H. Wood
On Tue, May 22, 2018 at 01:42:07AM +0100, Mark Rousell wrote: > On 21/05/2018 15:17, Mark H. Wood wrote: > >> Break backwards compatibility already: it’s time. Ignore the haters. I > >> trust you. > > (I understand that that's a quote of a discussion-opener from th

Re: A postmortem on Efail

2018-05-21 Thread Mark H. Wood
us. o What we have done, and are doing, to keep *your* cost down. o What else would we need to do, to make this something *you* want? -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 462

Re: Don't Panic.

2018-05-15 Thread Mark H. Wood
that locks can be picked, so you should remove all the locks from your doors right now." -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ul

Re: PCI DSS compliance

2016-11-10 Thread Mark H. Wood
I would be interested to hear this auditor's explanation of how *any* completely automated software system can protect private keys from a human with access to the system. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis

Re: Why would I want S/MIME?

2016-09-13 Thread Mark H. Wood
ight one for each To: address. In some workplaces, S/MIME is mandated. That's another reason. :-) With all the phishing going on these days, I foresee a wave of companies issuing policies that unsigned mail seeming to come from a fellow employee must be reported and then ignored. Since it's al

Re: 2 Q's

2016-08-18 Thread Mark H. Wood
ady* a > nightmare without adding this to it. > > Better by far to provide a cronjob that can do the refreshing > automatically -- or, on Windows, to write a service to do it. No need for yet another service; use Task Scheduler to run the refresh command periodically. -- Mark H

Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2016-01-06 Thread Mark H. Wood
top leyphohap number 3!" I can learn that just about as quickly as "leyphohap" alone. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ulib.iupui.edu

Re: How can it be made even easier!?

2015-10-12 Thread Mark H. Wood
There are already enough examples of systems which have been made so easy to use that they should not be used at all. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ul

Re: How to get your first key signed

2015-10-01 Thread Mark H. Wood
- were that person someone "known" > to be nasty, it would have degraded my key's value. The best it could > have been is totally meaningless. To put my point more plainly: signatures on products and signatures on keys mean different things, and to gain trust for them works in differe

Re: bugs.gnupg.org TLS certificate

2015-03-13 Thread Mark H. Wood
you think as carefully about your choice of CA as you do about who you would have sign a PGP key. The more you depend on a certificate for *establishing* trust, the more it's going to cost you, because it's going to cost the issuer more to provide that assurance while protecting his

Re: German ct magazine postulates death of pgp encryption

2015-02-27 Thread Mark H. Wood
ct communities of communicators? *Are* there useful clusterings of communication needs, w.r.t. security, within the community of communicators? -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 4

Re: MIME or inline signature ?

2015-02-13 Thread Mark H. Wood
XKVDstXV2FbgO9Jvkze9Uo+10oQ6XNntG/xi > TTBnF6pFGsG8yrS1ecK/Oq2dSqif0g8cjjJ1SKUHhZr91pGWdr5X0UkmXjJIvP8= > =KuOK > -END PGP SIGNATURE- > > _______ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users -- Mark H.

Re: Thoughts on Keybase

2015-01-06 Thread Mark H. Wood
lot of labels ("identities") stuck on me by family, friends, enemies, employers, trading partners, etc., each of which is more or less independent. Various sets of these labels make up how my associates retrieve their concepts of me.) -- Mark H. Wood Lead Technology An

Re: Encryption on Mailing lists sensless?

2014-11-18 Thread Mark H. Wood
eath my collected letters to someone, how do I arrange the transmission of the necessary passphrases as well? I wonder if the lawyer who draws up my will would even understand the question. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University In

Re: Encryption on Mailing lists sensless?

2014-11-18 Thread Mark H. Wood
as I know, the principal effect of MTA-based antivirus in my life is to prevent me consciously emailing known innocuous code that I wrote to people who ask for it. So I for one wouldn't miss it. That's selfish of me, of course. -- Mark H. Wood Lead Technology Analyst University

Re: NSA, PGP and RSA

2014-10-02 Thread Mark H. Wood
honestly answer that question, if the suspected weakness has never been found? We don't know that it exists, and if it does exist we don't know its nature. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Stre

Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-27 Thread Mark H. Wood
it evaporates entirely. Lies, rumors, and faulty logic readily die of exposure. Expose them! If someone attacks your secrets...attack his! The falsity of a false argument is one of your opponent's centers of gravity, so strike it to keep him busy protecting it. Secrecy alone is defensive. Th

Re: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
(c) rely on some large corporation to handle the encryption and decryption > for us Same answer as (b). -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ulib.iupui.ed

Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
On Mon, Aug 18, 2014 at 08:15:49AM -0600, Aaron Toponce wrote: > On Mon, Aug 18, 2014 at 09:59:33AM -0400, Mark H. Wood wrote: > > Perhaps it would be a start if sites providing SMTP would turn on > > STARTTLS. > > STARTTLS does not encrypt mail. It only provides safe passag

Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
ps it would be a start if sites providing SMTP would turn on STARTTLS. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ulib.iupui.edu signature.asc Description: Digital signatur

Re: Automatic e-mail encryption

2014-07-21 Thread Mark H. Wood
s is only exposed on the sending SMTP server and > the receiving SMTP and mailbox servers (f.e., IMAP). The mailbox server I treat hop-by-hop encryption, not as an alternative to end-to-end, but as defense in depth. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not

Re: symmetric email encryption

2014-07-21 Thread Mark H. Wood
> can only be kept for a while. Yes, that's an immense difference. > > Old Hell's Angels saying, "3 people can keep a secret if two of them are > dead". Not a very sophisticated bunch but.. Often attributed to Benjamin Franklin. -- Mark H. Wood, Lea

Re: Key distribution via NFC

2014-07-04 Thread Mark H. Wood
an do that. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/ma

Re: mascot_p

2014-06-19 Thread Mark H. Wood
On Wed, Jun 18, 2014 at 01:56:45PM +0100, Brad Rogers wrote: > On Wed, 18 Jun 2014 08:45:26 -0400 > "Mark H. Wood" wrote: > >What sort of mascot would combine the two aspects? > > Racoon? Easily recognised so an allusion to identity there. Their face > has a &#

Re: mascot_p

2014-06-18 Thread Mark H. Wood
Assuming that there *should * be a mascot, the discussion seems to concentrate on the secrecy aspect of GnuPG. But what about the other aspect -- assertion of identity? Does that spark any ideas? What sort of mascot would combine the two aspects? -- Mark H. Wood, Lead System Programmer mw

Re: mascot_p

2014-06-17 Thread Mark H. Wood
We have one, but it's a secret. :-) > How about an Octopus? As I understand it, they like to try and open > locks. Alas, the octopus is already associated with GitHub: https://octodex.github.com/original/ -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should

Re: adele

2014-06-12 Thread Mark H. Wood
ected by *trademark* or *service mark*. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnu

Re: Docs central, with 'Email Self-Defence'

2014-06-10 Thread Mark H. Wood
meone more knowledgable will correct my errors. I figure that, if I trot out my limited knowledge, I may help someone to understand just a bit, and I too may learn something in the process. > I suggest: Just give it a try. That is my suggestion as well. -- Mark H. Wood, Lead System

Re: Why create offline main key without encryption capabilities

2014-06-03 Thread Mark H. Wood
who wants to offer to recover session keys rather than hand over more-general keys should work on that *now*, when you can perhaps get it into the law and common practice, rather than later, when you cannot get it into court. Right now might be a good time to be heard on questions of narrowing

Re: GPG's vulnerability to brute force [WAS: Re: GPG's vulnerability to quantum cryptography]

2014-05-15 Thread Mark H. Wood
which gives the interesting summary: thermodynamically reversible processes are theoretical and don't occur in the real world. These seem to live in the same realm with 100% frictionless surfaces and insulation with infinite R-factor. That article seems confused as to whether a reversible proces

Re: Access to www.gnupg.org only via TLS

2014-05-01 Thread Mark H. Wood
for a certificate *and the services necessary to maintain it*. As someone pointed out, this is a predictable and avoidable cost. I do think that a CA should not charge for revocation, but that implies that I should have already paid for possible needs to which I'm committing myself. -- M

Re: hash email addresses / directory privacy enhancement

2014-04-30 Thread Mark H. Wood
On Tue, Apr 29, 2014 at 06:46:30PM +0100, MFPA wrote: > On Tuesday 29 April 2014 at 3:23:10 PM, in > , Mark H. Wood wrote: > > > Eh, I consider the possibility of address harvesting an > > opportunity for a bit of sport. I enjoy occasionally > > crafting a new regular

Re: hash email addresses / directory privacy enhancement

2014-04-29 Thread Mark H. Wood
Eh, I consider the possibility of address harvesting an opportunity for a bit of sport. I enjoy occasionally crafting a new regular expression to make maildrop automatically toss a new strain of UCE. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly

Re: UI terminology for calculated validities

2014-04-25 Thread Mark H. Wood
What about abandoning terms of art and just saying things more simply: "This message was signed by key . You have indicated that you trust that key." -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. sig

Re: UI terminology for calculated validities

2014-04-25 Thread Mark H. Wood
cally authenticated by comparing the signature sample on the draft to a trusted signature sample, either already on file or executed by the named person in the presence of the authenticator. (Apparently Latin borrowed this one from Greek.) Is that of any help at all? -- Mark H. Wood, Lead S

Re: signatures for other people's emails

2014-04-16 Thread Mark H. Wood
was made, the inner document bore a specific signature. It may be possible to compress the structure if there were defined signature types for these uses, so that one knows (for example) to include all of the foregoing signatures in the text to be validated. -- Mark H. Wood, Lead System Programm

Re: It's 2014. Are we there yet?

2014-04-10 Thread Mark H. Wood
t you know it. After that, it's all just multiplying impossibly huge numbers. That's dumbed down considerably, but I think it gets the basic idea across simply. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines sho

Re: making the X.509 infrastructure available for OpenPGP

2014-02-06 Thread Mark H. Wood
al CAs typically are audited periodically to determine that their operations conform to their CPS. The problem is that a CPS can say *anything*. Without reading it, you have no way of knowing what you should expect that CA's certificates to mean. -- Mark H. Wood, Lead System Programmer mw...@

Re: making the X.509 infrastructure available for OpenPGP

2014-02-06 Thread Mark H. Wood
re and haven't thought deeply about why they might want more. So: what would one want from X.509 certificates used to initialize an OpenPGP session? What would it take to get that? -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machin

Re: making the X.509 infrastructure available for OpenPGP

2014-02-04 Thread Mark H. Wood
Assuming you trust those CAs. All of them. Having said that, you might look at how OpenSSH has included X.509 certificates in its operation. There is precedent for something like what you suggest. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Ma

Re: cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-31 Thread Mark H. Wood
ts. Most people haven't got anything worth that much time and effort. The greatest expectation of reward probably lies in waiting for me to make a misteak. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.a

Re: [Announce] GnuPG launches crowdfunding campaign

2013-12-20 Thread Mark H. Wood
rmal > & common in England when I grew up there. This is also common in USA, and seems to refer to the tradition of giving a just-born infant a swat on the rump to encourage the beginning of breathing (because the baby needs air to yell at you). At any rate, it means as new as can be; fre

Re: Any future for the Crypto Stick?

2013-12-03 Thread Mark H. Wood
me away. The cost, as we've recently seen, could be considerable. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-use

Re: gpgsm and expired certificates

2013-11-08 Thread Mark H. Wood
opic anyway, I'll continue and opine that this add-on would only be doing for self-signed cert.s and other unknown CAs the same thing that the user *should* have done with those commercial root cert.s: evaluate and install them individually. (Of course hardly any of us have done this.) -- Ma

Re: The symmetric ciphers

2013-10-31 Thread Mark H. Wood
rong as, or stronger than, either AES or BLOWFISH alone. Then ask the same question for each composition you think promising. You will wind up doing quite a LOT of math. You could probably get a book out of it, if you do a thorough job. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Ma

Re: The symmetric ciphers

2013-10-31 Thread Mark H. Wood
Having not read far enough down the thread, Mark H. Wood wishes to recall a completely redundant message: > Consider a composition of *three* ciphers: > > A := ROT13 > B := ROT10 > C := ROT3 -- Mark H. Wood, hasty poster mw...@iupui.edu Machines should not be friendly.

Re: The symmetric ciphers

2013-10-31 Thread Mark H. Wood
no stronger than any single one. Obviously this should not be assumed to hold true for all possible functions, but it provides a counterexample: composing ciphers does not necessarily produce a stronger cipher. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should n

Re: trust your corporation for keyowner identification?

2013-10-16 Thread Mark H. Wood
s is the notion that one can buy a box of security off the shelf and thereafter be secure, without thinking about what one is doing. It seems to me that designing secure processes for your specific needs should work better and be cheaper in the end. -- Mark H. Wood, Lead System Programmer mw..

Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-20 Thread Mark H. Wood
n you keep a secret? B: No. A: Then I won't tell you any. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-u

Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-16 Thread Mark H. Wood
keeping an eye on it. > > And let me give a big "d'accord!" to Werner's "we don't need to rush." On the one hand, we don't need to rush. On the other, it is good to see that people are thinking ahead, because I don't want to see matters come to a state

Re: Can I create domain keys?

2013-08-14 Thread Mark H. Wood
es mingled. It would depend on how I have known him to use his identities. But if they are the same person, then what harm? I try to keep my personal and professional identities distinct, but some people don't. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be

Re: Can I create domain keys?

2013-08-14 Thread Mark H. Wood
natures. Suspicious, verify out-of-band. It seems unduly risky. Traditional methods of forgery try to bury one identity under another, but forging PK certificates *asserts* a new identity. It feels to me like making too much noise -- it attracts attention just when and where the forger wants to

Re: Why trust any software?

2013-08-06 Thread Mark H. Wood
t; Fri, 26 Jul 2013 09:22:32 -0400 > "Mark H. Wood" wrote: > > > Well, Windows users who aren't programmers, who switch to e.g. Linux, > > will then be Linux users who aren't programmers, so this alone changes > > little for the individual. He is stil

Re: Why trust gpg4win?

2013-07-26 Thread Mark H. Wood
or people to find out for themselves who is reliable and form open-eyed trust relationships. If one wishes to be more self-sufficient, one must learn a great deal about work formerly left to others. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Mach

Re: Multiple email addresses - any alternative to ask everyone to sign all my keys?

2013-07-24 Thread Mark H. Wood
rent dimensions of communication security. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-us

Re: Multiple email addresses - any alternative to ask everyone to sign all my keys?

2013-07-24 Thread Mark H. Wood
urreptitious monitoring, how do "they" know that I am not doing surreptitious monitoring? Remote log servers, firewall logs, 'tripwire', cheap cameras the size of an aspirin tablet -- Mark H. Wood, Lead System Programmer mw...@iupui.edu M

Re: Multiple email addresses - any alternative to ask everyone to sign all my keys?

2013-07-24 Thread Mark H. Wood
mail sent to my > unversity addresses on the computer at university. And I want to use > encryption, since the mails might contain sensitive information, such as > exams, grades, etc (and the mail servers are maintained by students). It's called compartmental design. No one compromise

Re: Recommendations for handling (multiple) user IDs - personal and company ones

2013-06-10 Thread Mark H. Wood
at the real cost of crypto: you have to think about it. There is no escape; you have to think deeply about slippery things like identity and trust and threat models, and then you have to apply your resulting policies a hundred times a day. Software can relieve large parts of the latter

Re: Why OpenPGP is not wanted - stupid is in vogue right now

2013-06-10 Thread Mark H. Wood
it is right and proper for me to control, and it is wrong and improper for others to attempt to control them, because my society generally agrees that this is so and my government is (generally) willing to enforce laws codifying these norms. -- Mark H. Wood, Lead System Programmer mw...@i

Re: [OT] Why are you using the GPG / PGP keys?

2013-05-29 Thread Mark H. Wood
use now. The world is changing > but most of the changes aren't good. Wow, *real* military use? I want to see an iPhone after Raytheon has had a go at it. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc

Re: Relevance of e-mail (was [OT] Why are you using the GPG / PGP keys?)

2013-05-29 Thread Mark H. Wood
Ha, that reminds me, when I submit artifacts to Maven Central (a public code repository) I'm required to OpenPGP sign them. Maven has a very nice plugin which handles this automatically. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines s

Re: Relevance of e-mail (was [OT] Why are you using the GPG / PGP keys?)

2013-05-28 Thread Mark H. Wood
ils I've sent, but I assert that I sign all emails addressed to humans. (Some mailing-list robots are fragile and have trouble with signatures when directly addressed. Boo.) -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be o

Re: [OT] Why are you using the GPG / PGP keys?

2013-05-28 Thread Mark H. Wood
ven sure who would study such things. Anthropologists, I suppose. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient. signature.asc Description: Digital signature ___ Gnupg-users

Re: Questions about OpenPGP best practices

2013-02-26 Thread Mark H. Wood
ct: No route to host > gpg: keyserver internal error > gpg: keyserver send failed: Keyserver error The site doesn't want unencrypted connections, and they way they enforce this is by returning "no route" to requests for connection to port 80. I would have used "administ

Re: US banks that can send PGP/MIME e-mail

2013-02-26 Thread Mark H. Wood
their jaws up off the floor. This is probably the origin of the closed, private email system locked away inside each bank's site. That is, perhaps, where one should work on acceptance of suitable encryption and signing. ("Suitable" including wh

Re: US banks that can send PGP/MIME e-mail

2013-02-25 Thread Mark H. Wood
ghtly difficult to steal or forge, is not something that most people can realistically do with the current crop of CAs. Long-distance relationships in the security realm make trust difficult, in both directions. None of this has a great deal to do with OpenPGP or GnuPG as such. -- Mark H. Wo

Re: Paperkey 1.3

2013-01-08 Thread Mark H. Wood
On Mon, Jan 07, 2013 at 05:54:15PM +0100, Peter Lebbing wrote: > On 07/01/13 16:39, Mark H. Wood wrote: > > I'd suggest assuming some periodic read-only use, since we *should* be > > testing our backups regularly to discover decay *before* it makes > > something irretrie

Re: Paperkey 1.3

2013-01-07 Thread Mark H. Wood
than the on-the-shelf lifespan of already written > data. I'd suggest assuming some periodic read-only use, since we *should* be testing our backups regularly to discover decay *before* it makes something irretrievable. -- Mark H. Wood, Lead System Programmer mw...@iu

Re: Is a document signed with hellosign legally binding?

2013-01-04 Thread Mark H. Wood
I don't know, but I must say that I'm wary of dealing with unknown people who are collecting signature samples from all over Europe, offering a service which seems to accomplish very little and making disputed claims about its legal effect. -- Mark H. Wood, Lead System Progr

Re: OT: USB key with hardware encryption?

2012-12-03 Thread Mark H. Wood
ed-flapped or zipped pocket, for example, or even a money belt or a traveller's concealed document shoulder pouch) in which you will carry the medium, and write out a checklist to make certain that you've followed your procedure. -- Mark H. Wood, Lead System Programmer mw...@iupui.ed

Re: what is killing PKI?

2012-10-04 Thread Mark H. Wood
in the virtual world as in the physical world and I had better understand how to get it. If more people would cross that bridge, I wouldn't have to work so hard, because more of the burden would be shared. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Who also thinks locks are i

Re: what is killing PKI?

2012-08-31 Thread Mark H. Wood
;me + anybody in the IT department at ${giant e-tailer} + anybody at the records management service they use" to "me". I think that's a significant reduction. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like askin

Re: what is killing PKI?

2012-08-30 Thread Mark H. Wood
On Thu, Aug 30, 2012 at 10:33:32AM -0400, Mark H. Wood wrote: > On Wed, Aug 29, 2012 at 03:14:50PM -0400, Landon Hurley wrote: > [snip] > > I do have a question about where you talk about backups though. How > > does PKI prevent back up loss? > > If I can prove that I pos

Re: what is killing PKI?

2012-08-30 Thread Mark H. Wood
isclose my public key, which is not secret, to my correspondents; my private key never leaves my equipment unless someone penetrates *my* system or steals *my* backups. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like asking whether people

Re: what is killing PKI?

2012-08-30 Thread Mark H. Wood
ryone from my more intimate conversations with my wife -- we feel comfortable being vulnerable in the presence of those who love us, but uncomfortable showing that same vulnerability to others. In every society there are questions it would be highly improper for a stranger t

Re: what is killing PKI?

2012-08-29 Thread Mark H. Wood
tor or lawyer who adopts a pervasive records security plan (of which customer communications would be but a part) should be able to negotiate lower insurance premiums. It seems to me that people are leaving money on the table all over. -- Mark H. Wood, Lead System Programmer mw...@iupui.

Re: what is killing PKI?

2012-08-28 Thread Mark H. Wood
ful (in his eyes) that he might want assurance that only the intended recipient be party to the discussion. I doubt there ever was anyone who had *nothing* to hide. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are effici

Re: Why "trouble"?

2012-08-27 Thread Mark H. Wood
locks and sealed envelopes, but they are not taught to generalize these acts. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like asking whether people are smart. pgp8zojtuQtPo.pgp Description: PGP signature ___

Re: changing the default for --keyid-format

2012-05-30 Thread Mark H. Wood
re it is. Perhaps the search function (when there is one) could scroll it, or sort all of the current hits to the top of the table widget's viewport. I've been meaning to do something about that but, I'm ashamed to say, I haven't gotten it done. -- Mark H. Wood, Lead System Pr

Re: getting an encrypted file to show what public key was used

2012-05-30 Thread Mark H. Wood
n't guarantee reducing it to a single-element space. * And anyone who puts socks in one drawer and shirts in another has used hash indexing. :-) -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like asking whether people are s

Re: Draft of nine new FAQ questions

2012-05-25 Thread Mark H. Wood
to deaddiaeresis. For German I also need a lower quote. Finding > 3 new keys with Emacs is hard ;-). And life is too short to go trawling the Internet for X Compose sequences. If I could find a comprehensive table I'd probably use them more. -- Mark H. Wood, Lead System Programmer mw.

Re: Testing GPG EMail encryption

2012-05-25 Thread Mark H. Wood
On Thu, May 24, 2012 at 08:27:59PM +0100, michael crane wrote: > >> mwood@mhw ~ $ dir /usr/bin/gpg* Sorry, that's lingering evidence of my VMS habits: mwood@mhw ~ $ alias dir alias dir='ls -l' -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether

Re: Testing GPG EMail encryption

2012-05-25 Thread Mark H. Wood
works on my system, even though there is no GPG v1 installed on it anywhere, does demonstrate that gpg v1 is not required and gpg v2 is not the problem. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like asking whether people are smart. pgpSQ

Re: Testing GPG EMail encryption

2012-05-24 Thread Mark H. Wood
signed message to myself at another address, from Thunderbird, using Enigmail. It arrived signed, with a valid signature. Thunderbird + Enigmail + gpg2 works. You should consider the possibility that you have a different problem. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu

Re: SSH Agent keys >4096 bit?

2012-05-04 Thread Mark H. Wood
Let me turn things around. Other than providing opportunities to discuss the practicalities of large RSA keys, is there any reason why the agent should care what size key it is storing? -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Asking whether markets are efficient is like asking

Re: On message signing and Enigmail...

2012-02-02 Thread Mark H. Wood
jects don't come from you. The pattern that you establish is evidence but not proof. I would like to say that, while proof settles the matter, evidence short of proof often has value. I'm going to continue to sign every email. Besides, I'm too lazy to turn it on and off. :-)

Re: hashed user IDs redux [was: Re: Creating a key bearing no user ID]

2012-01-27 Thread Mark H. Wood
hat someone does once they have your > private information: harvesting is the act of collecting. A difficulty here is that "spamming" is fairly specific, while "privacy" (it seems to me) is huge, amorphous, and defined differently by different people. -- Mark H. Wood, L

  1   2   >