I made a self-signed cert this way, but could not get mail to use it for 
sending mail. Mail instead would complain that my old expired cert was invalid 
because it was expired [1].

I deleted the certificate and then made one more directly by using the defaults 
(which are for an s/mime certificate), opened the certificate and said to trust 
the certificate for s/mime. [2]

The second certificate didn't work, either.

I think I'll give up for a while.

Bill
[1] Deleting the old certificate is not an option, because it would cause all 
emails using it to become unreadable.

[2] This yielded a certificate with (from what I could see) the same properties 
as the longer method. 

> On Jan 14, 2020, at 13:03, Pen Helm <pen-...@earthlink.net> wrote:
> 
> Looks like you can use the Keychain Access app to create your own S/MIME 
> keys.  I think it's going to be less trouble than GPG.  There is a tutorial 
> (slightly dated) at:
> http://www.extinguishedscholar.com/wpglob/?p=1018
> 
> 
>> On Jan 13, 2020, at 10:01 PM, Lee Larson <leelar...@me.com> wrote:
>> 
>> On Jan 13, 2020, at 6:03 PM, Bill Rising <bris...@mac.com> wrote:
>> 
>>> I poked around for a bit and found that everyone was talking about using 
>>> GPGTools. They want $24 for their plugin for Mail (or allow compiling from 
>>> source for free, as long as the user can go into source and find and strip 
>>> the code for the payment). There were people who were using it without the 
>>> plugin, but then it looked like a real hack.
>> 
>> I paid for it. I want to use PGP/GPG so I can control my own keys. I’ve 
>> always been a little leery of the companies that give or even sell 
>> encryption key pairs because in the beginning they do have the keys and 
>> there’s nothing to stop them from keeping them. With the GPG setup, I have 
>> complete control of my keys.
>> 
>>> Do you have something you recommend which would make it (relatively) 
>>> painless? Most of what I say, the NSA can read, and then sell to Google in 
>>> a private-public partnership. Oh wait, is it the other way around?
>> 
>> The most painless method to do secure messaging is probably Apple’s 
>> Messages. But, you need some sort of Apple device at each end.
>> 
>> In my family, those of us with Apple devices use Messages. With lesser 
>> devices, we use GPG. We do this for several reasons: we do transfer 
>> financial information, particularly since some elderly family members have 
>> recently died and left money that must be handled; and, we value our privacy.
>> 
>> L^2
>> 
>> ----
>> Lee Larson
>> leelar...@me.com
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> MacGroup mailing list
>> Posting address: MacGroup@erdos.math.louisville.edu
>> Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/>
>> Answers to questions: <http://erdos.math.louisville.edu/macgroup/>
> 
> _______________________________________________
> MacGroup mailing list
> Posting address: MacGroup@erdos.math.louisville.edu
> Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/>
> Answers to questions: <http://erdos.math.louisville.edu/macgroup/>


_______________________________________________
MacGroup mailing list
Posting address: MacGroup@erdos.math.louisville.edu
Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/>
Answers to questions: <http://erdos.math.louisville.edu/macgroup/>

Reply via email to