Comparing Mutt notes [Was: Privacy considerations when using mutt]

2010-05-23 Thread Erik Christiansen
On Mon, May 10, 2010 at 04:17:58PM -0500, Kyle Wheeler wrote: Let's compare notes (granted, this is two years old): http://www.memoryhole.net/kyle/2008/03/my_bashrc.html Thanks for have(). Elegant simplicity _and_ readability! (If only bash were more like that.) In return, maybe somone can

Re: Privacy considerations when using mutt

2010-05-11 Thread Cameron Simpson
Something I've not seen in this thread: surely the header cache, if used, will leak information onto your hard drive? -- Cameron Simpson c...@zip.com.au DoD#743 http://www.cskk.ezoshosting.com/cs/ Using encryption on the Internet is the equivalent of arranging an armored car to deliver

Re: Privacy considerations when using mutt

2010-05-11 Thread markus reichelt
* Kyle Wheeler kyle-m...@memoryhole.net wrote: It'll ask for my gpg password, decode it, etc. I can even then use gpg-agent to store my passphrase and allow me to quit and restart mutt multiple times without retyping the passphrase. With regard to gpg/gpg-agent and hibernating check this:

Privacy considerations when using mutt

2010-05-10 Thread chombee
Hi, I'm wondering about the privacy implications of using mutt. Say I'm using it on my laptop (or any untrusted host, maybe a computer owned and administrated by someone else) and if my laptop gets stolen I don't want my email to be compromised in any way. I don't want a copy of my email to be

Re: Privacy considerations when using mutt

2010-05-10 Thread Kyle Wheeler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Monday, May 10 at 04:06 PM, quoth chombee: I'm wondering about the privacy implications of using mutt. Say I'm using it on my laptop (or any untrusted host, maybe a computer owned and administrated by someone else) and if my laptop gets

Re: Privacy considerations when using mutt

2010-05-10 Thread Tim Gray
On May 10, 2010 at 11:00 AM -0500, Kyle Wheeler wrote: I used to do that, until I discovered the power of gpg to decode things on the fly. Now I have an encrypted mutt config file that is sourced by the main mutt config file, like this: source gpg -d .muttrc.secure.gpg| Do what?!?

Re: Privacy considerations when using mutt

2010-05-10 Thread Gary
chombee chom...@lavabit.com writes: I'm wondering about the privacy implications of using mutt. As usual, if they have physical access then all bets are off. Having said that, at least physical access to a computer you own is pretty much under your control. Data on some remote server? Not so

Re: Privacy considerations when using mutt

2010-05-10 Thread Morris, Patrick
chombee wrote: Hi, I'm wondering about the privacy implications of using mutt. Say I'm using it on my laptop (or any untrusted host, maybe a computer owned and administrated by someone else) and if my laptop gets stolen I don't want my email to be compromised in any way. I don't want a copy of

Re: Privacy considerations when using mutt

2010-05-10 Thread rogerx
On Mon, May 10, 2010 at 12:08:52PM -0400, Tim Gray wrote: On May 10, 2010 at 11:00 AM -0500, Kyle Wheeler wrote: I used to do that, until I discovered the power of gpg to decode things on the fly. Now I have an encrypted mutt config file that is sourced by the main mutt config file, like this:

Re: Privacy considerations when using mutt

2010-05-10 Thread Kyle Wheeler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Monday, May 10 at 01:06 PM, quoth rog...@sdf.org: source gpg -d .muttrc.secure.gpg| Do what?!? That's awesome. Thanks for the tip. Not sure if I'll use it, but it's a great thing to keep in the bag of tricks. wow, a bash script freak