On Mon, Aug 17, 2009 at 12:39 AM, Daniel Hill <[email protected]>wrote:
> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Wondering if there is a safe way to back my public and private keys > any ideas? > > - -- > python -c "print \"\".join([ > \"\x79\x71\x6Du\056vgp\x40ae\142nr\".decode(\"\x72o\164\x5F_13\")[i] > for i in [1, 12, 9, 5, 13, 0, 4, 3, 5, 0, 0, 8, 11, 10, 7, 11, 9, 4, > 9, 13, 6, 4, 9, 2] ] )" > > http://www.facebook.com/YellowOnion > msnim:[email protected]<http://www.facebook.com/YellowOnion%0Amsnim:[email protected]> > xmpp:[email protected] <xmpp%[email protected]> > http://last.fm/user/Yellow-Onion/ > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (GNU/Linux) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iEYEARECAAYFAkqH/gUACgkQGplaCYOFvysORACaAmPyM8oMJNgHOAGYXNodHG3Z > pjEAniRXVxoqkuo7gzVjF//mAtl9beXJ > =nkYU > -----END PGP SIGNATURE----- > > If you want to impress people: memorize your private key. Can't say I've done it, yet, cant say I've met somebody who can :) -- Kent perl -e "print substr( \"edrgmaM SPA nocomil.i...@tfrken\", \$_ * 3, 3 ) for ( 9,8,0,7,1,6,5,4,3,2 );"
