-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Well,
I'm really sorry to have set up such a conversation :o)
As I said earlier I'm not quite good at crypto-things, all I wanted to
do was to protect my private key easily in case of HDD error.
And all I wanted to do with this little tool was to
On 12/18/2013 1:25 PM, Doug Barton wrote:
> (Robert, please ignore my tortuous use of "secure" in that sentence.) :)
Hey, I was being *nice*. I wasn't even pointing out that 3DES only has
112 bits of keyspace... ;)
___
Gnupg-users mailing list
Gnupg-u
On 12/18/2013 08:53 AM, Peter Lebbing wrote:
On 16/12/13 23:41, Doug Barton wrote:
but one argument against what you're suggesting is that it's only as secure
as the encryption used in step 1 of the hybrid approach.
If only everything in cryptoland was "only as secure as 3DES"...
I understan
On 16/12/13 23:41, Doug Barton wrote:
> but one argument against what you're suggesting is that it's only as secure
> as the encryption used in step 1 of the hybrid approach.
If only everything in cryptoland was "only as secure as 3DES"...
> The ability to apply SSS to the entire secret would be
On 12/15/2013 04:58 AM, Peter Lebbing wrote:
On 14/12/13 21:14, Leo Gaspard wrote:
Maybe if you explained what the limitations of are...?
My guess is the fact that only supports secrets up to 1024 bits; if you
want to share a larger secret you need to do a hybrid approach where you
s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
> AFAIK, *is* an implementation of SSS. So, why would you write
> a new version?
>
> I must say I didn't look at the source, as I do not see the point
> at first.
>
> So, this is a warning about security issues : something you made
> yourself
On 14/12/13 21:14, Leo Gaspard wrote:
> Maybe if you explained what the limitations of are...?
My guess is the fact that only supports secrets up to 1024 bits; if you
want to share a larger secret you need to do a hybrid approach where you
symmetrically encrypt the data and then use secr
On Sat, 14 Dec 2013 21:14, ekl...@gmail.com said:
> AFAIK, *is* an implementation of SSS. So, why would you write a new
> version?
FWIW, a few years ago, Phil Sutter wrote a daemon for GnuPG which
implements secret key splitting. I don't have the URL handy, but it
should be easy to find.
On Fri, Dec 13, 2013 at 12:12:12PM +0100, Mindiell wrote:
> Hello,
>
> I'm using GPG regularly and did want to "save" my private key.
>
> [...]
>
> I found (http://point-at-infinity.org//) too, but it wasn't
> really usable beacause it has too many limitations IMHO.
>
> So I did it mys
Hello,
I'm using GPG regularly and did want to "save" my private key.
On the IRC channel someone linked me to paperkey :
http://www.jabberwocky.com/software/paperkey/
While this project is really interseting, it does not fit my needs.
I found (http://point-at-infinity.org//) to
10 matches
Mail list logo