://files.intevation.de/users/aheinecke/gpgme.pdf
2: http://openpgp-conf.org/program.html#andre
--
Andre Heinecke | ++49-541-335083-262 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-
Hi,
On Friday 30 September 2016 01:00:35 Albert Astals Cid wrote:
> El dimecres, 21 de setembre de 2016, a les 17:46:43 CEST, Andre Heinecke va
escriure:
> Ok, done
> https://quickgit.kde.org/?p=sysadmin%2Frelease-tools.git=blobdiff=b56bb0
> 46e74551c7b83feb57cf8b
ild so that the transition will not break your development builds.
My task for the transition is: https://phabricator.kde.org/T3158
Regards,
Andre
--
Andre Heinecke | ++49-541-335083-262 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäfts
er.com/questions/161973/how-can-i-forward-a-gpg-key-via-ssh-agent
Where I took this from :-)
Regards,
Andre
--
Andre Heinecke | ++49-541-335083-262 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann,
ure who it was.
GnuPG itself handles the Bus problem by defining a set of keys / people where a
release is signed by at least one of these keys / people.
https://gnupg.org/signature_key.html
Imo this is a good solution. You don't have to share the key material and
there is still redundancy which p
that may depend on
Kleopatra.
Thanks and regards,
Andre
--
Andre Heinecke | ++49-541-335083-262 | http://www.intevation.de/
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 18998
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
signature.asc
Description
ould
be handled more gracefully by informing the user about that fact. Until this
is the case a distribution should require the installation of said agent or
face Bug reports about "Search not working".
Regards,
Andre
1: https://git.reviewboard.kde.org/r/126895/
2: https://mail.kde.org/
sense of security.
- Increases the attack surface as you need image parsers to parse external
Input.
- Key size is drastically increased.
- Considered bad practice even though the OpenPGP standard allows for this.
I did not find sources for these claims, just something I picked up in
discussions. I was not