Hi all,
I'm just curious: since a RSA public key is made mainly of just two
numbers, is it not possible (theoretically) to create both a valid
PGP key and X509 certificate using the same key information, and use
it with both protocols?
Also, is it not (theoretically) possible to convert X
webdevlv schreef:
I am a complete newbie to GPG so bare with. I have a gpg encrypted file and
two .asc files... file_sec.asc and file.asc (pubilc and secret key? I have
no clue what the terminology is). I also have a passphrase that needs to be
used.
Ok, I understand your issue. The bits yo
Hi David,
David Gray schreef:
[...]
AES256 is listed as a cipher but not a public key? What is the
The difference? I was hoping to use asymmetric keys with me
Giving the public key to the customer. As mentioned before this all
Works fine but I'm not sure which alogorithm I'm using when en
jkaye wrote:
Hi all,
I'm new to GnuPG, and have been getting some help
from a kind soul. I seem to have all the knowledge
that I need with one single, but important, exception.
When I decrypt, it asks for my passphrase. No problem
there except for the fact that I want to have an automated
s
Hi Jimmy,
Jimmy Kaplowitz wrote:
I currently access my email via mutt over SSH, and therefore my private
key is currently stored on that remote server. I am fully aware how bad
of an idea this is, and so if what I ask above is possible, I plan to
move my private key to a secure offline location
John W. Moore III wrote:
My 'gut feeling' is that there will be no significant progress toward
integration of GnuPG into PDA's & Smart Phones until there is a Model
offered with a Linux O/S. Last I heard, Palm was seriously talking
about this. Since then they appear to have jumped into bed wit
Is there any documentation on how to do that?
Say server A has the original data and server B has the backup.
You can do from server A:
backup_tool | ssh [EMAIL PROTECTED] dd of=/path/to/backup
or you can do from server B:
ssh [EMAIL PROTECTED] backup_tool | dd of=/path/to/backup
Reg
Hi,
Stef Caunter wrote:
I have populated ~/.gnupg/random_seed with 600 bytes from /dev/urandom
This is generally a very *bad* idea in terms of cryptography:
/dev/urandom uses a pseudo-random generator with predictable results,
(relatively) low random quality that is not suitable at all for
Charly Avital wrote:
Option 2 is better, IMO.
I don't think you can create a new uid *without* an e-mail address,
unless you present it (when going through the generation's prompts) as
something that looks like an e-mail address, e.g.
[EMAIL PROTECTED], of whatever you like, but
consisting of tw
much as a signature made with the primary key),
whereas any signature made with the windows workstation is valid only
inside the company.
Q4. How can I mark my level of trust for the different subkeys using gnupg?
Thanks in advance for any enlightenment,
--
Raphaël Poss
10 matches
Mail list logo