how vulnerable is hidden-encrypt-to

2012-08-17 Thread auto15963931
Is there any way on heaven or earth for someone to discover from a message, one sent to them or to another person, whether the encrypted message had been made with an option hidden-encrypt-to or what key ID had been used in conjunction with that option? Thanks.

Re: how vulnerable is hidden-encrypt-to

2012-08-17 Thread auto15963931
Hauke Laging: Am Fr 17.08.2012, 09:56:56 schrieb auto15963931: Is there any way on heaven or earth for someone to discover from a message, one sent to them or to another person, whether the encrypted message had been made with an option hidden-encrypt-to Sure. start cmd: LC_ALL=C gpg

Re: message signature types

2012-08-01 Thread auto15963931
Charly Avital: auto15963931 jv92pc$ct5$1...@dough.gmane.org July 31, 2012 2:47:22 PM wrote: If this is the wrong place to ask, please point me in the right direction. Where can I learn more about importing, if such a thing is even done this way, and making use of message signatures which

Re: message signature types

2012-08-01 Thread auto15963931
Werner Koch: On Wed, 1 Aug 2012 16:50, auto15963...@hushmail.com said: So the last question is just how do I go about checking whether one of these smime.p7s certificates has been revoked. What is the process of revocation in general? Thanks. There are three ways: - Using a CRL. The

message signature types

2012-07-31 Thread auto15963931
If this is the wrong place to ask, please point me in the right direction. Where can I learn more about importing, if such a thing is even done this way, and making use of message signatures which utilize an smime.p7s file? I got a message from someone who uses this, and I need to learn about

Re: pinentry

2012-04-07 Thread auto15963931
On 4/4/2012 9:50 PM, Hauke Laging wrote: This does not happen here (Linux, though). Hauke, hello. I expect when I get to the bottom of it all, I will find the fault is caused not by Windows but by my error or need for an adjustment of some kind. I was hoping that my description would trigger

pinentry

2012-04-04 Thread auto15963931
I use gpg on Windows OS. On the command line when I use this command: gpg -d filename.asc a pinentry window pops up requesting my passphrase. If it happens that the message was encrypted with the option --throw-keyids, then the pinentry window, not knowing which key was used, starts with one

Re: [admin] Re: signature verification data

2012-04-04 Thread auto15963931
On 3/27/2012 12:55 PM, Werner Koch wrote: Hi, please remember to strip your quotes down to a reasonable size. Shalom-Salam, Werner Shalom to you likewise. My bad, Werner! Thanks for the reminder about your preferences. What is this url for: gmane-disc...@hawk.netfonds.no? How

Re: signature verification data

2012-03-27 Thread auto15963931
On Sun, 25 Mar 2012 13:18:37 + Daniel Kahn Gillmor d...@fifthhorseman.net wrote: On 03/25/2012 02:33 AM, auto15963...@hushmail.com wrote: When an encrypted file sent to me is both encrypted and signed, when I use a command like this: gpg -o file-out -d file-in I can see the signature

signature verification data

2012-03-25 Thread auto15963931
When an encrypted file sent to me is both encrypted and signed, when I use a command like this: gpg -o file-out -d file-in I can see the signature verification data appear as standard output, in the terminal, while the file-out contents are separated from it. Is there a way to have the

invalid gpg key revocation

2012-03-06 Thread auto15963931
___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: invalid gpg key revocation

2012-03-06 Thread auto15963931
Okay, there are a lot of responses, and I need to get to the bottom of this as quickly as possible, but I also want to do so methodically. Let me respond to the points raised as best I can until this is resolved. -Original Message- From: gnupg-users-boun...@gnupg.org

Re: invalid gpg key revocation

2012-03-06 Thread auto15963931
-Original Message- From: gnupg-users-boun...@gnupg.org [mailto:gnupg-users- boun...@gnupg.org] On Behalf Of Ingo Klöcker Sent: Monday, March 05, 2012 3:37 PM To: gnupg-users@gnupg.org Subject: Re: invalid gpg key revocation On Sunday 04 March 2012, Robert J. Hansen wrote: On

Re: invalid gpg key revocation

2012-03-05 Thread auto15963931
I am 99.9% sure no one has gotten access to my machine or my keys. If they had, I have to believe that there would have been more damage done than this, and that does not appear to have happened. I mention the details, which may seem irrelevant, only because sometimes the devil is in the

invalid gpg key revocation

2012-03-04 Thread auto15963931
Hello. Supposing I create a key with an arbitrary user ID, and it contains an email address that is not real but exists only for sake of having a key to use for signing and encrypting with a pseudonym, and supposing I make the public key available by putting a copy of it on an anonymous