mention it once:
On Mon, Sep 16, 2013 at 5:45 PM, Philip Jägenstedt phi...@foolip.org wrote:
http://pgp.cs.uu.nl/ can help for keys in the strong set, but requires
a lot of manual work.
Since the signature paths it finds can be verified separately, I don't
think it matters that it's not served over
On Wed, Sep 18, 2013 at 10:00 PM, NdK ndk.cla...@gmail.com wrote:
Il 17/09/2013 22:01, Philip Jägenstedt ha scritto:
That's fine, I'm just trying to figure out what others do to convince
themselves that (e.g.) the GnuPG dist sig key is trustworthy-ish and
if there are any tools to help
instead.
--
Philip Jägenstedt
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the n
people would need to be deceived effect by (in a temporary keyring)
assigning marginal trust to all keys in the world and
--marginals-needed n, without requiring the paths to be independent.
Does that sound right?
--
Philip Jägenstedt
___
Gnupg-users
On Tue, Sep 17, 2013 at 4:17 PM, Daniel Kahn Gillmor
d...@fifthhorseman.net wrote:
On 09/17/2013 09:56 AM, Philip Jägenstedt wrote:
Going with the GnuPG built-on model, it seems like I can get the n
people would need to be deceived effect by (in a temporary keyring)
assigning marginal trust
On Mon, Sep 16, 2013 at 12:07 PM, Peter Lebbing pe...@digitalbrains.com wrote:
On 15/09/13 21:11, Philip Jägenstedt wrote:
In very concrete terms, how can I determine which keys I need to
import so that the GnuPG dist sig (4F25E3B6) has full validity?
As far as I can see, there are two
On Mon, Sep 16, 2013 at 8:11 PM, Peter Lebbing pe...@digitalbrains.com wrote:
On 16/09/13 17:45, Philip Jägenstedt wrote:
I'm guessing key servers simply can't be queried for this information.
I'm pretty sure they can't be directly queried for this information.
Too bad. I guess one could do
to determine if a
signed git tag is in fact from a key I can trust without a lot of
manual work.
--
Philip Jägenstedt
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
http://pgp.cs.uu.nl/ in order to find
the shortest paths and then manually import the keys to verify that it
is in fact true...
--
Philip Jägenstedt
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Thu, Sep 12, 2013 at 12:16 AM, Hauke Laging
mailinglis...@hauke-laging.de wrote:
Am Mi 11.09.2013, 23:42:30 schrieb Philip Jägenstedt:
My public key has the default capabilities sign and certify. I've seen
that some people have only the certify capability in order to be able to
keep
My public key has the default capabilities sign and certify. I've seen
that some people have only the certify capability in order to be able to
keep the main key offline most of the time.
Is it technically possible to change the capabilities of an existing
key, even if there's no way to do it via
On fre, 2013-08-02 at 07:17 +0200, Philip Jägenstedt wrote:
The first time I bypassed this didn't turn out great, so can someone
confirm to me that my (3) existing signatures locally, signing again and
... that *deleting* my signatures locally ...
/ Philip
signature.asc
Description
Hi all,
I'm new to GnuPG and have probably been a little too ambitious for my
own good. I originally signed key AB4DFBA4 at level 3 after a meetup,
but was later paranoid that I was too lax and wanted to resign it at
level 2, but did the resigning (by deleting the first signature locally)
and
13 matches
Mail list logo