On 2020-12-22T13:31:42+0100 Christian Chavez via Gnupg-users
wrote 2.8K bytes:
I'm currently helping my workplace test out Yubikeys - to see how/if
they could help us with our software development. One expected benefit
is to allow developers cryptographically sign Git commits/tags (e.g).
I
As a personal policy, I do not respond to emails if they are only in HTML. It
provides an excellent signal on when an email is actually worth the
distraction. Even password-reset/verify-your-email emails will have text-only
components. Mailchimp marketing emails, on the other hand, often skip ov
A: Take a look at Paperkey, https://wiki.archlinux.org/index.php/Paperkey; I
think it serves this need well. Not to diminish your work, good job! It's
probably a good thing to have diversity in implementations, so we don't get
stuck with the only thing being written in OCaml.
B: I'm not well ve
This is quite a painful process; I went through a similar journey on macOS. For
me, it seemed that GPG was expecting my master key to be in the signing key
slot on my Yubikey. What helped me debug this was turning on logging with
gpg-agent, and guru-level logging on scdaemon... have you tried th
On 2020-08-11T21:18:24+0200 Johan Wevers wrote 0.9K
bytes:
> On 11-08-2020 17:18, Stefan Claas wrote:
>
> >> Why hardware? If a bug is found you can't upgrade it easily.
> >
> > Because hardware can't be tampered with like software.
>
> If a hardware bug is found you're still lost. Even Apple
I like it.
Keybase did a lot of great things, but with their future in the hands of Zoom,
it's good that we have alternative, decentralized, open source things being
developed.
On 2020-08-07T13:33:22+ Jacky Alcine via Gnupg-users
wrote 1.9K bytes:
> Reminds me of Keybase without the fluf
Create another subkey with the "Encryption" usage.
This page may help: https://alexcabal.com/creating-the-perfect-gpg-keypair
Don't skip the part about creating backups. You might have a good reason to
skip this part, and many people have a lot of good reasons to skip creating a
backup, but wha
It appears that 3C5B212A55B966881E2D2718A45398B520BEE91E does not have the [E]
usage for encryption, nor does it have any subkeys with that usage. This subkey
would have been created by default when the master key was created. See if you
can recover it?
>From your prior message on 2020-07-13, i
If this is run as a scheduled task and with the passphrase kept in a text file,
perhaps just remove the passphrase?
On 2020-07-25T07:30:50+ Ian Maclauchlan
wrote 8.1K bytes:
> Hi there we recently upgrade our Windows server from 2008 to 2019 and Gnu to
> 3.1.12
>
> Since then the command
You probably don't wanna muck around with a binary .sig file but if you create
a .asc file with `gpg --armor --detach-sign bort`, then the myfile.asc file
will have lines with `-BEGIN PGP SIGNATURE-` and `-END PGP
SIGNATURE-`. Don't mess with the data between them. Anything befor
On 2020-07-14T11:20:53+0200 Ingo Klöcker wrote 2.5K bytes:
> On Dienstag, 14. Juli 2020 02:48:06 CEST Philihp Busby via Gnupg-users wrote:
> > 2: What benefits benefits are there to having separate master keys for
> > personal and professional use? Outside of not wanting
1: When revoking a UID from my key, it asks for a reason. What happened to
reasons 1, 2, and 3?
Please select the reason for the revocation:
0 = No reason specified
4 = User ID is no longer valid
Q = Cancel
2: What benefits benefits are there to having separate master keys for personal
an
It pulls all of your keys from the keyserver, which will update their
expirations and get new signatures and revocations.
I do not believe it should _delete_ keys from your keyring. Just tell you if
the owner has revoked them.
>From the man page:
> --refresh-keys
> Request u
Regenerating your secret key like this is perhaps dangerous and easy to do
wrong, for example you will probably leak it in your shell's history. If an
attacker finds out this is your scheme, they can then start to brute force your
secret key without need any access to your data, which happened w
14 matches
Mail list logo