setaling? like Jeffrey Wigand?

2012-09-03 Thread peter . segment
On 29/08/12 01:11, MFPA - expires2...@rocketmail.com wrote: At the very least, is she stealing from her employer by doing something other than work in the time her employer has bought from her? In a way, yes. So did Jeffrey Wigand. Peter M. ___ Gnu

adieu mes amis

2012-09-03 Thread peter . segment
Well, it's been a month of, for me, very illuminating reading. I am not a subscriber, as I prefer to read the list content only occasionally, on-line, if and when I need it; so every post I sent had to pass the moderators, for which I would like to thank them. (This might have also been the reaso

symmetric vs. asymmetric in group use

2012-08-28 Thread peter . segment
On 28/08/12 01:54, No such Client - nosuchcli...@gmail.com wrote: If you are restricting heavily the people you share your public key with, why not simply use a symmetric algorithm, forgetting public key cryptography completely? > Uhh. because the benefit of pubkey encryption is still there, mi

if you have something to hide, please step aside...?

2012-08-26 Thread peter . segment
On 25/08/12 17:41, Charly Avital - shavi...@gmail.com wrote: Nobody has to hide, this is not about hiding. [...] when one > sends or receives an encrypted message, the mere format of such a communication hollers loud and clear that the user is protecting his/her communications, not hiding. T

Why "trouble"?

2012-08-25 Thread peter . segment
On 25/08/12 01:59, Faramir - faramir...@gmail.com wrote: IMHO, the main trouble probably is people don't feel the need to protect their privacy. If they don't feel that need, why should they bother in learning, or even asking about privacy software? Why "trouble"? There's a leitmotif in a

on running C-Z/SUV without a "group manager"

2012-08-24 Thread peter . segment
On 24/08/12 06:55, Faramir - faramir...@gmail.com wrote: You are welcome, lets add more comments. your comments are appreciated. This group's (C-Z/SUV) thinking on the role of a "group manager" has evolved. I believe for the better. GPG is on the other hand so tightly integrated with WOT

what is killing PKI?

2012-08-24 Thread peter . segment
On 23/08/12 17:07, Robert J. Hansen - r...@sixdemonbag.org wrote: Deploying PKI is nowhere near as big of a problem as convincing people that PKI adds benefit to their lives. and Right now the number one thing killing PKI is the fact nobody wants to adopt it. If you state, "well, before som

Re: gpg "simplified"?

2012-08-23 Thread peter . segment
Thank you for your comprehensive comments, On 22/08/12 03:16, Faramir - faramir...@gmail.com wrote: I think you are wrong about that. All the user needs is a properly configured portable install of GnuPG (and very likely, an easy to use GUI, because if Allice can't understand WOT, probably us

learning curve like Monte Cervino

2012-08-02 Thread peter . segment
On 01/08/12 23:05, Robert J. Hansen - r...@sixdemonbag.org wrote: > By itself, GnuPG is useless. [...and more, much more, on steep learning curves and cargo-cult security]. I happen to agree with most of what was writetn in your lengthy expose. But you omit one important problem: the program lik

Re: gpg "simplified"?

2012-08-02 Thread peter . segment
(repatriating to the thread) On 01/08/12 22:13, ved...@nym.hush.com wrote: > http://www.angelfire.com/mb2/mbgpg2go/tp.html Useful reference, thank you. It would follow from there that (as I suspected) gpg 1.4.12 code base is the best candidate for the fork. caveat: You are the judge of what yo

trampCrypt family of CLI programs

2012-08-01 Thread peter . segment
On 31/07/12 19:25, Robert J. Hansen - r...@sixdemonbag.org wrote: Set up a trusted introducer/certificate authority and presto, bang, you're off to the races. When Alice comes on board at the company, the local authority generates a certificate for her, sets up her Thunderbird+Enigmail installa

Re: gpg "simplified"?

2012-07-31 Thread peter . segment
On 31/07/12 09:35, Werner Koch - w...@gnupg.org wrote: Why do you think gpg2 won't work or does any network access without user consent? Correct me if I'm wrong, but it is unreasonable to expect anybody to successfully and safely use gpg without understanding the concepts and mastering the skil

gpg "simplified"?

2012-07-30 Thread peter . segment
I have been asked to help a small group of individuals (perhaps hundreds, not thousands) with secure data exchange (including, but not restricted to e-mail). Use of full gpg is way beyond their capabilities. I am wondering if anybody has heard of a simplified version of gpg; or failing that, I wo