I made a self-signed cert this way, but could not get mail to use it for sending mail. Mail instead would complain that my old expired cert was invalid because it was expired [1].
I deleted the certificate and then made one more directly by using the defaults (which are for an s/mime certificate), opened the certificate and said to trust the certificate for s/mime. [2] The second certificate didn't work, either. I think I'll give up for a while. Bill [1] Deleting the old certificate is not an option, because it would cause all emails using it to become unreadable. [2] This yielded a certificate with (from what I could see) the same properties as the longer method. > On Jan 14, 2020, at 13:03, Pen Helm <pen-...@earthlink.net> wrote: > > Looks like you can use the Keychain Access app to create your own S/MIME > keys. I think it's going to be less trouble than GPG. There is a tutorial > (slightly dated) at: > http://www.extinguishedscholar.com/wpglob/?p=1018 > > >> On Jan 13, 2020, at 10:01 PM, Lee Larson <leelar...@me.com> wrote: >> >> On Jan 13, 2020, at 6:03 PM, Bill Rising <bris...@mac.com> wrote: >> >>> I poked around for a bit and found that everyone was talking about using >>> GPGTools. They want $24 for their plugin for Mail (or allow compiling from >>> source for free, as long as the user can go into source and find and strip >>> the code for the payment). There were people who were using it without the >>> plugin, but then it looked like a real hack. >> >> I paid for it. I want to use PGP/GPG so I can control my own keys. I’ve >> always been a little leery of the companies that give or even sell >> encryption key pairs because in the beginning they do have the keys and >> there’s nothing to stop them from keeping them. With the GPG setup, I have >> complete control of my keys. >> >>> Do you have something you recommend which would make it (relatively) >>> painless? Most of what I say, the NSA can read, and then sell to Google in >>> a private-public partnership. Oh wait, is it the other way around? >> >> The most painless method to do secure messaging is probably Apple’s >> Messages. But, you need some sort of Apple device at each end. >> >> In my family, those of us with Apple devices use Messages. With lesser >> devices, we use GPG. We do this for several reasons: we do transfer >> financial information, particularly since some elderly family members have >> recently died and left money that must be handled; and, we value our privacy. >> >> L^2 >> >> ---- >> Lee Larson >> leelar...@me.com >> >> >> >> >> >> _______________________________________________ >> MacGroup mailing list >> Posting address: MacGroup@erdos.math.louisville.edu >> Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/> >> Answers to questions: <http://erdos.math.louisville.edu/macgroup/> > > _______________________________________________ > MacGroup mailing list > Posting address: MacGroup@erdos.math.louisville.edu > Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/> > Answers to questions: <http://erdos.math.louisville.edu/macgroup/> _______________________________________________ MacGroup mailing list Posting address: MacGroup@erdos.math.louisville.edu Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/> Answers to questions: <http://erdos.math.louisville.edu/macgroup/>