On 28/08/12 21:54, Richi Lists wrote:
Will this also write also to the smart-card or are the changes only in
the local keyring?
UIDs are not stored on the smartcard, so it does not matter.
I'm a bit hesitant because the full disk encryption on my netbook works
also with the same key, and I
On Tue, 28 Aug 2012 21:48, ricu...@gmail.com said:
F Hi Werner,
the ! exclamation mark did the trick!
I tried specifying the subkey I wanted before, but only the exclamation
mark makes it work.
With the exclamation mark, also signing in evolution works again.
Is this documented somewhere?
Stan Tobias st...@mailshack.com wrote:
but generally people
don't like to be excluded, people want everyone to be open.
What I should have added here, is that it's a symmetric relation, and
people normally don't like to exclude others, as well. Avoiding others
is not a trait of _usual_
Hello List!
I'm (for some of you) your worst nightmare. Somebody who does not master
the fine arts of cryptography, yet has an oppinion about cryptography. I
might say I enjoy reading the thread on PKI, but I wasn't able to read
it all.
Please understand this is not a flame against Landon, but
I felt offended by my own email: What is stopping PKI from growing. So
I come with a question: some security apps like TrueCrypt and KeePass
allow the user to use a keyfile instead of a password.
Now, given a file filled with values 0 to 255 as random as they
possibly can get, a keyfile is the
On 29/08/12 11:49, antispa...@sent.at wrote:
I felt offended by my own email: What is stopping PKI from growing. So I come
with a question: some security apps like TrueCrypt and KeePass allow the user
to
use a keyfile instead of a password.
Note that your changing access to the key from what
I can't get it to work wether I try it on the primary or the sub key and
whether I use gpg or gpg2.
Rgds
Richard
$ gpg2 -v --edit-key E8401492!
gpg (GnuPG) 2.0.17; Copyright (C) 2011 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO
On 29/08/12 13:53, Richi Lists wrote:
I can't get it to work wether I try it on the primary or the sub key and
whether I use gpg or gpg2.
[...]
$ gpg2 -v --edit-key E8401492!
[...]
gpg: using subkey E8401492 instead of primary key 0AE275A9
Secret key is available.
Why are you forcing
On Wed, Aug 29, 2012 at 12:00:22AM -0400, Landon Hurley wrote:
[snip]
The barrier is solely cultural, not technical. Enigmail, Thunderbird and
gpg4win are trivial to set up. The first time I did it, it was on the
phone, talking someone through it. So we either need to invent some sort
of
Hello,
I'm the maintainer of a PHP package that integrates with GnuPG
(https://github.com/gauthierm/Crypt_GPG)
The package is used on a website to allow decrypting stored messages.
This is accomplished using the --status-fd and --command-fd options of
GnuPG, allowing the passing of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/29/2012 10:18 AM, Mark H. Wood wrote:
On Wed, Aug 29, 2012 at 12:00:22AM -0400, Landon Hurley wrote:
[snip]
The barrier is solely cultural, not technical. Enigmail,
Thunderbird and gpg4win are trivial to set up. The first time I
did it,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
El 28-08-2012 18:27, Stan Tobias escribió:
...
What would happen if you start reading your daughter's diary
everyday, but never let anybody catch you reading it? And you
are
...
I would be violating her privacy.
Right, that was my point.
Well, PKI is used by at least one country on a national level , it works
pretty well,
http://bankid.com , it is issued for free by all major banks, and there
are other PKI solutions issued by a few other companies which have
national adoption. You pay a bit extra with your mobile carrier if you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 August 2012 at 5:00:22 AM, in
mid:503d93d6.3050...@gmail.com, Landon Hurley wrote:
In that case, perception of threat and more importantly
loss of tangible goods keeps PIN secure.
Having perceived others as dishonest people
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 August 2012 at 8:50:40 AM, in
mid:503dc9d0.vmezcgmi+yoktybs%st...@mailshack.com, Stan Tobias
wrote:
What I should have added here, is that it's a symmetric
relation, and people normally don't like to exclude
others, as
15 matches
Mail list logo