* Johan Wevers:
> Do you have examples of this for security related subjects?
I try not to rely on Wikipedia, in particular when searching for
sensitive subjects. Besides, if that was unclear, I mentioned Wikipedia
as a general example of the good concept of a Wiki colliding with
humanity, not
On 28-07-2020 14:42, Ralph Seichter via Gnupg-users wrote:
> confused with facts. The amount of BS that can be found on Wikipedia is
> case in point.
Do you have examples of this for security related subjects? I know there
are issues with politically sensitive subjects but that has usually
other
* Ayoub Misherghi via Gnupg-users:
> How about collective and cooperative effort in a wiki, or cloud
> funding pledges or donations? Those who contribute (money or effort)
> get privilege of some kind.
>From what I observed over the years, a majority of Wikis only really
work within closely knit
Sorry for seeming to be "spreading unjustified accusations". What I said
was meant to encourage that sort of "benign tyranny", I was not
complaining; or at least that was not my intention.
Thank you for explaining how the list works.
Ayoub
On 7/27/2020 2:08 AM, Werner Koch wrote:
On
On Sun, 26 Jul 2020 12:59, Ayoub Misherghi said:
> The moderators on this list (I do not know who they are) have been
> tyrannical excluding some of my posts; I am not bitter or resentful. I
This mailing list is not moderated and thus your post are not excluded
by any moderated. The only
I understand it can be frustrating, especially if nobody has a deciding
vote or Vito power or moderator power. Someone should have have veto
power and anybody with other ideas can always fork and do his own thing.
That way it may probably work. A tyrant can stay on course and others
fork
> How about collective and cooperative effort in a wiki, or cloud funding
> pledges or donations? Those who contribute (money or effort) get
> privilege of some kind.
I am very pessimistic about the idea of collective effort. What
experience has taught me from working on the FAQ is that a small
How about collective and cooperative effort in a wiki, or cloud funding
pledges or donations? Those who contribute (money or effort) get
privilege of some kind.
On 7/26/2020 2:48 AM, Peter Lebbing wrote:
On 12/07/2020 20:01, Ayoub Misherghi wrote:
Can you please suggest some good
On 12/07/2020 20:01, Ayoub Misherghi wrote:
> Can you please suggest some good tutorial and reference material
> preferably free (probably mutually exclusive requirements) that will
> bring me up to your level or close to it please.
No, I think the available documentation is lacking in quality.
It is working now. The problem was in gpg-agent.conf that I
forgot about. I did not do a re-install.
I learned from this list. Thanks.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Sorry for splitting Peter and Philihp into two threads.
I have probably put my gpg environment/program in a state it
cannot come out of. I want to do what cowards do. I want to
uninstall gpg and start all over again, escaping from the mess I
I am re-sending this text only. I made the mistake of sending it html
previously.
Sorry for splitting Peter and Philihp into two threads.
I have probably put my gpg environment/program in a state it cannot come
out of. I want to do
Dmitry Alexandrov wrote:
> Peter Lebbing wrote:
> > You can actually unlock keys the way GnuPG intends to do that with:
> >
> > $ my-unlocker | /usr/lib/gnupg/gpg-preset-passphrase --preset
> >
> > You can find the keygrip for your keys with:
> >
> > $ gpg --with-keygrip --list-secret-keys
> >
Hi,
On 7/11/2020 3:34 AM, Peter Lebbing
wrote:
Hi!
On 10/07/2020 23:47, Ayoub Misherghi via Gnupg-users wrote:
ayoub@vboxpwfl:~/testdir$ gpg --list-secret-keys
Could you do
$ gpg --with-subkey-fingerprint
Sorry for going off list and messing everybody up. Now I disserve
punishment. Sorry for the html too.
Forwarded Message
Subject:Re: Newbie question.
Date: Sat, 11 Jul 2020 12:07:17 -0700
From: Ayoub Misherghi
To: Peter Lebbing
On 7/11/2020 11:30 AM
Thanks. This exposes to me how little I know and it will take me time to
absorb it. None of this information is in anything I read. Nothing comes
close. I will not come to grips with it with the kind of reading
material I have. Can you please suggest some good tutorial and reference
Peter Lebbing wrote:
> You can actually unlock keys the way GnuPG intends to do that with:
>
> $ my-unlocker | /usr/lib/gnupg/gpg-preset-passphrase --preset
>
> You can find the keygrip for your keys with:
>
> $ gpg --with-keygrip --list-secret-keys
>
> You do need it for every subkey you want
On 12/07/2020 17:45, Ayoub Misherghi wrote:
> Sorry for going off list and messing everybody up. Now I disserve
> punishment.
Heh :-). It's just that if I reply off-list, it only helps you, but if
it is on-list, other people can find it in a search engine when they're
facing something similar.
Hi,
On 11/07/2020 19:58, Ayoub Misherghi wrote:
> ayoub@vboxpwfl:~/sentry/trunk$ cat ~/.gnupg/gpg.conf
> batch
> pinentry-mode loopback
Ah yes. Those two options have no place in your gpg.conf. They are
options that you might want to specify as part of the command line on
occasion, but unless
Hi!
On 10/07/2020 23:47, Ayoub Misherghi via Gnupg-users wrote:
> ayoub@vboxpwfl:~/testdir$ gpg --list-secret-keys
Could you do
$ gpg --with-subkey-fingerprint --list-secret-keys
and
$ gpg --version
please?
And do you get a popup asking for your passphrase or is what you post
all the
What am I doing wrong:
ayoub@vboxpwfl:~/testdir$ ls
textfile
ayoub@vboxpwfl:~/testdir$ gpg -r develop1 -o textfile.gpg -e
textfile
ayoub@vboxpwfl:~/testdir$ ls
textfile textfile.gpg
ayoub@vboxpwfl:~/testdir$ gpg -u develop1 -o
On Fri, 23 Nov 2018 15:18, gnupg-users@gnupg.org said:
> gcry_version_check(1.8.4)
gcry_check_version requires a string with the version number or NULL.
Thus
--8<---cut here---start->8---
const char *s;
if ((s=gcry_version_check ("1.8.4")))
printf
Hi,
can anyone tell me the syntax of the gcry_cry_version function? Does it work in
this way:
gcry_version_check(1.8.4)
??
Sent from ProtonMail mobile___
Gnupg-users mailing list
Gnupg-users@gnupg.org
On 27/08/17 04:40, arznix via Gnupg-users wrote:
> I am developing a closed mesh network application where
> I want to encrypt the traffic using PGP. The local network
> will have no access the the greater worldwide web so it
> will not be able to access existing trusted Key Servers.
If it is an
> It is unclear from the documentation for GNUPG and some of the supporting
> writeups on other websites whether I can create a Key Server for the local
> network that will generate public and private key pairs.
This doesn't sound like any keyserver I've heard of. Normally
keyservers only store
Hi,
On 08/27/2017 11:40 AM, arznix via Gnupg-users wrote:
Can anyone clarify whether it is possible to create a local Key Server using the
GNUPG tools?
Not with GnuPG itself. The GnuPG project does not provide a keyserver
software.
Most keyservers out there are powered by a software called
Hi,
This is a total newbie question as I have just discovered GNUPG.
I am developing a closed mesh network application where
I want to encrypt the traffic using PGP. The local network
will have no access the the greater worldwide web so it
will not be able to access existing trusted Key Servers
Hello,
I am new to GPG, especially writing programs to decrypt stuff. Is this the
right mailing list to ask?
Regards,
Griffin CHENG.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Griffin Cheng [CLIB] csch...@cpce-polyu.edu.hk wrote:
Hello,
I am new to GPG, especially writing programs to decrypt stuff. Is this
the right mailing list to ask?
gnupg-users is for most discussions and gnupg-devel is for
programming/development specific questions. HTH.
Cheers,
--Paul
--
2009/10/31 Charly Avital shavi...@mac.com:
Please check the MacGPG2 Project at:
http://sourceforge.net/projects/macgpg2/
The current installer for MacGPG2 2.0.12 is available. It will install a
Mac native pinentry application.
An updated version for v2.0.13 will be available in a few days
On Mon, 16 Feb 2009 22:45, kloec...@kde.org said:
What if the signing key is expired or has been revoked?
Unless you use --list-options show-unusable-uids those signatures are
not shown.
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
paramouse escribió:
I am new to using GnuPG and hoping this is the the correct place to post
questions.
For practice, I imported some public keys to my keyring. I ran a
gpg --check-sig
After listing the signatures of the public keys I've
On Mon, Feb 16, 2009 at 02:48:11PM -0300, Faramir wrote:
paramouse escribi??:
I am new to using GnuPG and hoping this is the the correct place to post
questions.
For practice, I imported some public keys to my keyring. I ran a
gpg --check-sig
After listing the signatures of
On Mon, 16 Feb 2009 18:48, faramir...@gmail.com said:
The signatures not checked seems pretty self explanatory. What does
the bad signatures mean?
The signed data does not match the signature. That is the signed data
or the signature has been modified or the signature was not correctly
On Monday 16 February 2009, Werner Koch wrote:
On Mon, 16 Feb 2009 18:48, faramir...@gmail.com said:
The signatures not checked seems pretty self explanatory. What
does the bad signatures mean?
The signed data does not match the signature. That is the signed
data or the signature has
I am a newbie to GnuPG, and am using gpg-agent so that I only need to enter
my passphrase once. If I decrypt a file (which I encrypted to myself), I am
of course asked to enter my passphrase. If I decrypt it a second time,
gpg-agent supplies my passphrase from its cache. However, gpg2 still
I used libTomCrypt (cf.: http://libtom.org/) to implement something
similar. The data viewer executable contains (somewhat concealed)
private key, and data sets are encrypted using the public key of the
pair. (LibTomCrypt is much more flexible and easier to program against
than Libgcrypt when you
As I understand it, people only need my public key if they are going to encrypt
a file for me. If I will only be sending them encrypted files, then I need
their public key but they don't need mine. Is this correct?
Thanks.
Regards,
Bruce
___
Hi,
* Bruce Cowin wrote (2007-02-13 08:06):
As I understand it, people only need my public key if they are going to
encrypt a file for me. If I will only be sending them encrypted files, then I
need their public key but they don't need mine. Is this correct?
Yup.
They will also need your
Hi all,
I have a question concerning an unusual way of using gnuPG...
I don't want to encrypt emails, I just want to encrypt binary
data and deliver that over the internet. Consider the following
scenario: I have a program that gets deliverd to various clients.
The program is a viewer for 3d
Hi Sven,
Hi!
Private/Public key does not buy you much in this case if all
you want is to obfuscate the file contents.
Just use some AES implementation with the same symmetric key
on the server and the client.
Despite you seem to be aware of it, let me stress again:
It cannot possibly
On Fri, 9 Feb 2007 11:36, [EMAIL PROTECTED] said:
Mh... That means I've missed something really fundamental...
When you send an encrypted mail you send the encrypted
data and the receiver at some point has both, the public
key and your encrypted mail. Else, how should he read your
mail? Am
Hi,
On Fri, 9 Feb 2007 11:36, [EMAIL PROTECTED] said:
Mh... That means I've missed something really fundamental...
When you send an encrypted mail you send the encrypted data and the
receiver at some point has both, the public key and your encrypted
mail. Else, how should he read
On Fri, Feb 09, 2007 at 11:36:35AM +0100, Antonio Bleile wrote:
Hi Sven,
Hi!
Private/Public key does not buy you much in this case if all
you want is to obfuscate the file contents.
Just use some AES implementation with the same symmetric key
on the server and the client.
On Fri, 9 Feb 2007 12:01, [EMAIL PROTECTED] said:
- Does libcrypt do the job? I guess so...
No. Libgcrypt provides basic building blocks but has no support for
any specific protocol.
- The CAD data may contain a fixed header, so an atacker knowing
the header might use this info to easily
Hi
I visited the Win PT link from gnupg.org site. This link
http://www.stud.uni-hannover.de/~twoaday/winpt.html has the following
1. http://www.stud.uni-hannover.de/~twoaday/sipfone-exe.zip - Windows
binary
2. http://www.equipmente.de/gnupt-int.exe - graphicall installer which
seems to
46 matches
Mail list logo