-detectable,
and if you are already checking the gnupg sourcecode,
you can see that the generation of primes for keys is quite
impeccably done ;-)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
Sorry, wrong link extension,
here is the correct one:
http://www.pgpdump.net/
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Kara karadenizi at gmail.com wrote on
Wed Jul 20 02:18:16 CEST 2011 :
Is it a bad idea to place your secring in dropbox?
Using a decent password generator and specifying a mix of upper
and
lower case letters, digits, and special characters, how many total
characters -- as a minimum -- would
and secret keys
(n.b. if anyone knows the proper pgp commandline syntax to extract
a pgp secret key from the keyring, please post)
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the private
and public pgp keyblocks
n.b.
if these are RSA keys, then you either need the IDEA module in
gnupg, or need to first remove the passphrase and then export the
key from pgp and then import then into gnupg
vedaal
___
Gnupg-users mailing list
and interface?) together myself.
-
if you're on windows,
then this may be the closest to what you are looking for:
http://www.gpg4win.org/
get started and play with it,
and ask anything you want in the gpg4win community or here,
and
*welcome* to the world of openPGP encryption ;-)
vedaal
are anywhere near this strict
about such things,
but if they ever did decide to be, the mechanism by which they
could make it stick, is there.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
is still
pretty much unfactorable for the not-too-near future. ;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Ingo Klöcker kloecker at kde.org wrote on
Wed Mar 23 22:39:05 CET 2011 :
So, out of 2^2048 candidates you eliminate 1+2+...+300 = 300*301/2
=
45150 candidates which lie in those intervals. Impressive!
lol!
like I said,
4096 bit keys will remain secure for the not-too-near future
vedaal
is.
You don't want to do this with Three Letter Agencies or criminals,
whereas it might be OK for decent university administrations. :-)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, not that I have anything against any
others, but have been used to using it and see no particular reason
to change),
and gnupg still decrypts without any problems or error messages,
and confirms the MDC.
vedaal
___
Gnupg-users mailing list
Gnupg
windows systems from a command line dos
window, without having pgp or gnupg installed.)
For 'gnupg64.bat' the first line of the above two lines should
read:
set GNUPGHOME=home
As mobile phones become bundled with OSes, it shouldn't be long
before gnupg can be run on a mobile.
vedaal
to move up from SHA-1,
then can the MDC be modified to apply to the non-256 bit ciphers as
well,
(or at least amend the gnupg error message to a less ominous one,
that MDC's are not generated for non-256 bit ciphers) ?
vedaal
___
Gnupg-users mailing
a little concerned
about the above alert message ;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
will work.
(Don't worry if CAMEllIA isn't listed, it just means you aren't
using the latest version of GnuPG.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the sale, use or
other dealings
* in this Software without prior written authorization from Werner
Koch.
=[end quoted section]=
Well even if you don't recommend it,
at least people who *need* it, can now trust the author ;-))
vedaal
___
Gnupg
encrypted somewhere else too, where
they 'can' decrypt, or there are some 'shares' stored away
somewhere ...
If you're lucky, and they happened to sign anything with the shared
key after the time they claimed not to be able to reconstruct the
key, then you caught them.
vedaal
of --show-session-key.
Upon decryption, GnuPG shows the number of the symmetric algorithm,
followed by a colon, followed by the session key string
(i.e, '2:' indicates that 3DES is the symmetric cipher used).
vedaal
___
Gnupg-users mailing list
be to have GnuPG clear all its processes once
the screen saver goes on, or in a user-settable time after the
screen saver is activated, i.e, 1, 3, 5, or 10 min, or custom user-
set time, with a default at 3 min.
vedaal
___
Gnupg-users mailing list
Gnupg
: decryption okay
gpg: WARNING: message was not integrity protected
gpg: session key:
`2:FEAF701191406BCD0FA27D387E2CAA34BCD5CB2FFF82DC79'
Note 'cipher 2' and 'hash 8'
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
is a starting point:
http://csrc.nist.gov/publications/drafts/800-78-3/markup_draft-nist-
SP_800-78-3.pdf p.12
If somoene knows the exact NIST or FIPS document I'm thinking of,
please post, TIA!
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
using a 256 symmetric cipher
actually use a 15k rsa key??
(makes me more comfortable with my prefereces for 3DES and a 4k key
;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
symmetrically encrypted revocation certificate, and
the encrypted file from step [1] in a location you consider safe
for your threat models.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
through some e-mail clients
and systems that don't allow attachments.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
commandline version of
6.5.8
(available here:
http://www.pgpi.org/products/pgp/versions/freeware/ )
and set up a test system, and see if you can communicate with it
using gnupg, and then tell the pgp6.5.8 client what additional
commandline entries the client needs to use.
vedaal
will not recognize v4 RSA keys, so you must
use the --pgp6 option when generating a key, and gnupg will
automatically pick an old style dh key for you.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
, the key would be made with both
individuals names:
i.e. smithjo...@jonessmith.test
(Comment: this keypair is in possession of both Smith and Jones)
so, if you saw a signed message with this key, you would think it
would be signed by either Smith or Jones
vedaal
want to have
'plausible deniability' with
(b) a signed message shown to anyone else, only means that 'one' of
you signed it. Both of you know which one 'really' signed it,
but neither can prove it.
vedaal
___
Gnupg-users mailing list
Gnupg-users
vedaal at nym.hush.com wrote on Fri Jul 23 15:51:38 CEST 2010
and since you really didn't
encrypt the message, you can't give up the session key, and now
the
government wants *all* your keys and passwords to prove you didn't
encrypt the message.
Sorry :-)
meant to say:
and since you
keypair in your possession.
(Please see my amended post.)
My point was only to show how the 'throw-keyid' option has
potential problems.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
,
[pthasher by Karen Kenworthy http://www.karenware.com]
still, I thought it might be done in gnupg with one of the 'cool
undocumented' commands, but couldn't find it using gpg --dump-
options
vedaal
___
Gnupg-users mailing list
Gnupg-users
Is there a gnupg command to verifiy a hash, not a signature, (e.g.
MD5, SHA1, SHA256), by entering the hash string and the file or
text it corresponds to?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
the key whose passphrase it is, and then GnuPG will decrypt
it.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
'Multiple simultaneous signatures' done in armored signed
format, or in signed and encrypted format, or as detached
signatures, will not cause any problem for 6.5.8, 6.5.8 ckt, or
6.5.8 commandline.
vedaal
___
Gnupg-users mailing list
Gnupg-users
session keys indicates that
the it didn't recognize the algorithm used, (probably AES or
another one that came after PGP 6.x. )
David's advice of using the option of --PGP6 on the GnuPG side will
make everything work again on the PGP end.
vedaal
and automatically
extract it when only the secret key is imported.
Try this:
[1] export your secret key
[2] re-import it
Gnupg will automatically extract the public key and add it to your
keyring.
(hope it's not too late, and you can still do it from your keyring
or a backup ;-) )
vedaal
(Z1), ZLIB (Z2), BZIP2 (Z3)
(If you have a gnupg version earlier than 1.4.10, Camellia won't be
listed.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
in gnupg, and just leave
the hushmail key for hushmail users
(i use my hushmail key only for hushmail/hushtools)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
length or alert/advisory should be,
i leave it up to the developers or the ietf open-pgp wg ;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
' at the ciphertext.
--vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
was checking my original v3 rsa key in gnupg1.4.9 and got the
following gnupg output with the 'edit' command:
pub 2048R/85306D25 created: 2000-09-05 expires: never
usage: SCEA
trust: ultimate validity: ultimate
[ultimate] (1). vedaal nistar ved...@hush.com
in kleopatra
if this also doesn't work,
then maybe those here with more linux experience can help
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
David Shaw dshaw () jabberwocky ! com wrote on 2009-11-28
22:08:38 :
They're more likely to hit you with a wrench, a la
http://xkcd.com/
538/ :)
also,
he has a rather interesting sympathetic take on the MITM attack:
http://xkcd.com/177/
;-)
vedaal
you know what your threat model is.
This will probably not be a good idea to use if your threat model
includes dangerous determined adversaries who know the field.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
of steganography exploration ;-)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, and is it configurable?
(also, i always thought she had black hair, not red, and her
complexion in the icon looks awfully pale ;-) )
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
willing to trust experts in the field who have vetted the
code ;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
), it will use the same cipher unless you
specifically mention which cipher to use when you encrypt
symmetrically
[2] might not need the option of 'expert', am not sure
(but if you want to do custom stuff, just leave it there anyway,
and more choices will show up at the gpg prompt ;-) )
vedaal
anonymity,
and you create a new key and give that public key to only certain
individuals, or keep it for your own uses, and then revoke your old
key, and 'disappear off the grid' ;-)
i don't see any advantage if the key is already compromised and the
attacker has the encrypted messages
vedaal
cryptographer who occasionally answers
interesting crypto questions
for the other posters there,
some are very helpful
and some are not at all
and some vary ... ;-)
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
rounds broken ;-) ))
but as AES is the default gnupg block cipher of choice,
am just bringing it to people's attention here
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
name ('name' is the name of the cipher your client
wants)
then save your gpg.conf
and run
gpg --gen-key
the key will be generated with the cipher your client wants
if this still doesn't help,
then please post 'exactly' what you need done
vedaal
any ads or links below this message are added
.
there are 'too many' little incompatibility 'workarounds'
that you might need to do, if you continue using 6.5.8 ;-((
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Become a medical transcriptionist at home
as the cipher of your secret key
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Save big on Stock Trading Fees. Click Now!
http://tagline.hushmail.com/fc/BLSrjkqa2gbQZjvQvfwfqPj2p6No8bU1TUERhp1RsUquoWLdpYh4lrVcPGA
aa...@key.test
File `c:\q.txt' exists. Overwrite? (y/N) y
gpg: session key:
`10:6EB46AC795C6CCB418116E50DDFDC8CBD3D345761C2759DD5223E8D5D30923DC
'
c:\gnupg
so,
does gnupg prompt you to 'overwrite' if you don't use the --yes
option ?
vedaal
any ads or links below this message are added
no longer possible ***
and while the authorities might be tempted to vengefully harm the
bearer,
it would be clear that they would be unable to access the laptop
through torture
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature
. archivals, etc.)
[4] retrieve it from the microfilm and check that the hashes verify
and that the file decrypts
[5] (weakest point of this scheme ;-) )
make sure your really secure passphrase is somehow remembered in
the future when it is time to decrypt ... ;-))
vedaal
any ads or links below
which
you must do to read its contents
(unless you're superhuman),
well,
in case anyone is paranoid about superhumans,
here is a spoof i wrote about
clairvoyancy decryption of pgp messages ;-))
http://www.angelfire.com/pr/pgpf/fdca.pdf
vedaal
any ads or links below this message are added
the secret key ?
tia,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Need cash? Click to get an emergency loan, bad credit ok
http://tagline.hushmail.com/fc
typing might need to be as much
as just re-typing the secret key)
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Free information - Learn about IRS Tax Solutions. Click now!
http://tagline.hushmail.com/fc
with revocation certificates is also useful for Vedaal:
http://lists.gnupg.org/pipermail/gnupg-users/2008-
October/034741.html
Yes, Thanks!
i really like the idea of hexadecimal encoding line by line with
checksums
it's a very useful and do-able way to print out a secret key block
with the plan
interesting
what sources do you recommend reading ?
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Click here for free information on starting a business from your home.
http://tagline.hushmail.com/fc
,
and is not heard from again ...
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Click now for instant access to public records!
http://tagline.hushmail.com/fc/PnY6qxtBI01DDkRM8ACuXa3NEtJsYlSkHsZfaTVTfIPIroVXnYMRR
system that can be done to know
when the level of 'pseudo-randomness' has decreased to where it
should be of practical concern ?
tia,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Never be in the dark again
was using the 16 bit dos build,
and didn't switch yet to the 32 bit win build
how does gnupg manage to maintain 16, 32, 64 bit
hardware independence?
TIA,
vedaal
--
Get a wet and wonderful shower head. Click now!
http://tagline.hushmail.com/fc/PnY6qxs2RCKE4j8VCOcH5gc2UF9uKpX1Ab5PfvMCZsBWNFVlKnqmL
interesting crypto concepts that would be
fascinating if explored ...
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Chart your path to success with a smart new business plan. Click here!
http://tagline.hushmail.com/fc
-pgp'
requires,
as long as gnupg is 'compatible')
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Save for the future with great IRA Funds. Click now!
http://tagline.hushmail.com/fc
with sender, also check time of e-mail sending
now, even if the attacker goes through the trouble of altering his
computer time-clock to the time of the signature and then encrypts,
there will still be an unmistakable 'suspicious' delay in the e-
mail sending
vedaal
any ads or links below
years,
so,
open-pgp and gnupg
can hold off on plans to implement Whirpool,
keep things as they are for now,
and see who the winner is,
and then take some more time for it to get vetted in the wild
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness
with existing options,
please let me know
Thanks,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Find the apartment of your dreams by clicking here now!
http://tagline.hushmail.com/fc
legal hassles from the PGP corporation
#
#
this is being double-signed so that people using any (non-CKT) GUI
of 6.5.8, can see it crash on *any* windows platform
#
#
vedaal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Acts of Kindness better the World, and protect the Soul
is incompatible with anything later than win98,
and should not be installed
#
[5] potentially major legal hassles from the PGP corporation
#
#
this is being double-signed so that people using any (non-CKT) GUI
of 6.5.8, can see it crash on *any* windows platform
#
#
vedaal
-BEGIN PGP SIGNATURE-
Version
on the hash?
if SHA-512 were to be used,
would it mean that the passphrase could theoretically be 2^512-1 ?
tia,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Spend quality time on the open seas with a great boating
interefere with encryption or decryption
(only having it,
and having it with an 'error' means something ;-) )
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Self Storage Options - Click Here.
http
as a cipher,
even if no other ciphers are
another things that affects how gnupg chooses a cipher is
the option of;
s2k-cipher-algo ciphername
(by default, if this option is not used, gnupg uses CAST-5 for
symmetrical ciphers when no key is specified)
vedaal
any ads or links below this message
if the client already has 6.5.8
he may be more amenable to making a new key,
and then all you have to do, is use the option of --pgp6
and gnupg will automatically make sure that everything you send can
be decrypted and verified by 6.5.8)
vedaal
any ads or links below this message are added by hushmail
,
then send me a reply that is encrypted to my key
theoretically, also
if someone wanted to use this new program that had only 3DES, and
tried to import a keypair made with the default setting in gnupg,
it wouldn't be usable, because the secret key is, 'by default'
protected with CAST-5, not 3DES
vedaal
and verify anything with that
DH/DSA key
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Enhance your home's curb appeal with name brand shutters. Click now.
http://tagline.hushmail.com/fc
compatible
one...)
otherwise,
just use the 'default' for gnupg key generation
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Save hundreds on getting a Web Design Degree. Click here.
http
vedaal at hush.com vedaal at hush.com
wrote on Thu Jul 31 16:04:22 CEST 2008 :
sandra.de.groot at nl.abnamro.com sandra.de.groot at nl.abnamro.com
wrote on Thu Jul 31 14:12:42 CEST 2008 ; ---^^^
you might try using the latest version of pgp 8.x
(available at zedz)
sorry,
forgot
. This means that obtaining
it
from zedz is a copyright violation, and probably should not be
advocated.
moot ;-)
just tried to check the pgp8.0 license
8.x is NOT available on zedz ...
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature
decrypt
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Hit it out of the park with a new bat. Click now!
http://tagline.hushmail.com/fc/Ioyw6h4fAyoZU3DmUvpqkQxJjzzLBUKz2fZdIRBjvh0trk3S1i2gAf
to the gnupg development team
(and remember Maxine in your Prayers/Thoughts/etc. ...)
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Stop foreclosure. Click here to stay in your home and rebuild credit.
http
mean,
is that you want to protect the entire password as a data item,
using Shamir's secret-sharing system
that does work,
sorry,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Click here for top quality Spyware
by the geeky mind ;-)
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
What a capital idea! Click now for great vacation packages to Washington DC!
http://tagline.hushmail.com/fc
David Shaw dshaw at jabberwocky.com
wrote on Wed Apr 2 16:24:43 CEST 2008 :
Note that we're up to version 1.4.9 now though.
the gnupg website
http://www.gnupg.org/
and all the download links
http://www.gnupg.org/download/index.en.html
still lists 1.4.8
and doesn't mention 1.4.9
vedaal
any
(other than still using a v3 key and idea ;-)) )
TIA,
vedaal
any ads or links below this message are added by hushmail without
--
Click here to choose from a huge selection of shipping supplies!
http://tagline.hushmail.com/fc/REAK6ZBPnMblQux3ayDSua5qXy6KnlPR1TiJywFAh70Sdppg1Q6tLB/
my
sorry,
a silly oversight on my part, ;-((
IDEA loads fine on 1.4.9
vedaal
any ads or links below this message are added by hushmail without
--
Click to recieve credit card help and get out of debt fast.
http://tagline.hushmail.com/fc/REAK6ZBOk4NIwhYiT5hHUXjgn2GYzFMx1ahERXmgLhbVQ6NHRxQfyn/
my
EditPadLite.exe
you can compose any correspondence from editpadlite, without using
any of the host computers software (e.g. word, wordpad, notepad,
etc.),
and there 'might' be less chance of the plaintext being saved on
the host computer by some file journaling system)
vedaal
any ads or links below
vedaal at hush.com (vedaal at hush.com)
wrote on Mon Mar 3 17:11:46 CET 2008 :
[5] open notepad and types these lines:
command com
z:
cd gnupg
sorry, forgot a line ;-((
it should be:
set GNUPGHOME=z:\gnupg
command com
z:
cd gnupg
vedaal
any ads or links below this message are added
. And it doesn't.
try this instead of --passphrase-file
--passphrase string
where 'string' is your actual passphrase
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Study law at a school near you. Click
within gnupg,
ready for all gpg commands
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
example, it was encrypted to 4 keys instead
of 5, i forgot i turned of my 'encrypt to default key' option ;-(
)
vedaal
any ads or links below this message are added by hushmail without
--
Click to get a free auto insurance quotes from top companies.
http://tagline.hushmail.com/fc
vedaal at hush.com vedaal at hush.com
wrote o Wed Feb 27 15:51:05 CET 2008
What I meant, was something like this mockup:
==
C:\gpg --recipient-keys ENCRYPTED_FILE.gpg
gpg: file ENCRYPTED_FILE.gpg was encrypted to the following keys:
actually, gnupg already does this when
David Shaw dshaw at jabberwocky.com
wrote on Wed Feb 27 19:23:34 CET 2008 :
By the way:
gpg --no-default-keyring --secret-keyring /dev/null the-file.gpg
.....
what is the correct command on 'windows' ?
TIA,
vedaal
any ads or links
lists all the keys the message was encrypted to
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Compete with the big boys. Click here to find products to benefit your
business.
http://tagline.hushmail.com/fc
is the pgpdump web interface:
http://www.pgpdump.net/
and here is the pgpdump home site and links for sourcecode:
http://www.mew.org/~kazu/proj/pgpdump/
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Save hundreds
/l8tnCMnk3A6o3ucVy1m
ZfpN/deyd4ssAQmgyqLqIB8Sc4TP4PVxeKndB193XdFa7In2125vU5jpgDUobvZQ
gwWWhyDj6DXvUMW8szXh/D3I7q3g3LfHX70U1MzOaqYpNrgEfjTRpiVngme7
hs879RjyLO6RTOWF93NghzAd3gVP2at7SXwghx4=
=Lw8Y
-END PGP MESSAGE-
vedaal
any ads or links below this message are added by hushmail without
solution to stop it.
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
The Perfect Baby Gift. Click Here
http://tagline.hushmail.com/fc/Ioyw6h4eUCjMPYjHbFDlJl4GLFkdg5rzznRGZDWJt71njDIDf5WCr9
familiar with encryption,
and are likely to begin to use it privately on their own
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Get a Business Credit Card. Click Here.
http://tagline.hushmail.com/fc
201 - 300 of 362 matches
Mail list logo