October 2011 Archives by subject
Starting: Sat Oct 1 02:57:42 CEST 2011
Ending: Mon Oct 31 21:08:06 CET 2011
Messages: 312
- adding text to detached signature files
Hauke Laging
- adding text to detached signature files
Doug Barton
- adding text to detached signature files
MFPA
- adding text to detached signature files
Hauke Laging
- adding text to detached signature files
Hauke Laging
- adding text to detached signature files
MFPA
- card error message in .gpg-agent.log
Seb
- card error message in .gpg-agent.log
Werner Koch
- digitally signing contracts
Eric Abrahamsen
- digitally signing contracts
Mark H. Wood
- digitally signing contracts
Melvin Carvalho
- digitally signing contracts
Hauke Laging
- digitally signing contracts
Werner Koch
- Expired keys
Jerry
- Expired keys
Hauke Laging
- Expired keys
Jerry
- Expired keys
Hauke Laging
- Expired keys
Jerry
- Expired keys
Richard
- GnuPG decryption problem
m.aflakparast at ut.ac.ir
- gpg version 2.0.17 with libgcrypt 1.4.6
Banks, Michael B
- gpg version 2.0.17 with libgcrypt 1.4.6
Werner Koch
- gpg version 2.0.17 with libgcrypt 1.4.6
Banks, Michael B
- GPG with SMP?
Aaron Toponce
- GPG with SMP?
Robert J. Hansen
- GPG with SMP?
Thomas Harning Jr.
- GPG with SMP?
Robert J. Hansen
- GPG with SMP?
Aaron Toponce
- GPG with SMP?
Thomas Harning Jr.
- GPG with SMP?
Robert J. Hansen
- GPG with SMP?
Robert J. Hansen
- GPG with SMP?
David Tomaschik
- GPG with SMP?
Robert J. Hansen
- GPGME and Windows Server 2003/2008
Megan Winkler
- GPGME and Windows Server 2003/2008
Megan Winkler
- GPGME and Windows Server 2003/2008
Werner Koch
- How can I know all the recipients of a GPG encrypted message
vivarto
- How to use a GnuPG card on multiple computers?
Urs Hunkeler
- How to use a GnuPG card on multiple computers?
Werner Koch
- How to use a GnuPG card on multiple computers?
Urs Hunkeler
- How to use terminal to change mac-cache-ttl
Vortran66
- How to use terminal to change mac-cache-ttl
Robert J. Hansen
- How to use terminal to change mac-cache-ttl
Werner Koch
- How to use terminal to change mac-cache-ttl
Robert J. Hansen
- How to use terminal to change mac-cache-ttl
Vortran66
- How to use terminal to change mac-cache-ttl
Robert J. Hansen
- How to use terminal to change mac-cache-ttl
Vortran66
- How to use terminal to change mac-cache-ttl
Robert J. Hansen
- How to use terminal to change mac-cache-ttl
Benjamin Donnachie
- ignore-cache-for-signing has no effect on gpg-agent
Jimmy C. Chau
- ignore-cache-for-signing has no effect on gpg-agent
Werner Koch
- ignore-cache-for-signing has no effect on gpg-agent
Jimmy C. Chau
- Is there a way to browse the GPG web of trust?
Melvin Carvalho
- Is there a way to browse the GPG web of trust?
Aaron Toponce
- Is there a way to browse the GPG web of trust?
Melvin Carvalho
- Is there a way to browse the GPG web of trust?
Aaron Toponce
- Is there a way to browse the GPG web of trust?
Melvin Carvalho
- Is there a way to browse the GPG web of trust?
Werner Koch
- Is there a way to browse the GPG web of trust?
Aaron Toponce
- Is there a way to browse the GPG web of trust?
Melvin Carvalho
- Is there a way to browse the GPG web of trust?
Jerome Baum
- Is there a way to browse the GPG web of trust?
Robert J. Hansen
- Is there a way to browse the GPG web of trust?
Peter Lebbing
- Is there a way to browse the GPG web of trust?
Robert J. Hansen
- Is there a way to browse the GPG web of trust?
Aaron Toponce
- Is there a way to browse the GPG web of trust?
Daniel Kahn Gillmor
- Is there a way to browse the GPG web of trust?
Daniel Kahn Gillmor
- Japanese localization issue for designated revoker message
Hideki Saito
- kernel.org status: establishing a PGP web of trust
Marcio B. Jr.
- kernel.org status: establishing a PGP web of trust
Robert J. Hansen
- kernel.org status: establishing a PGP web of trust
Aaron Toponce
- kernel.org status: establishing a PGP web of trust
Aaron Toponce
- kernel.org status: establishing a PGP web of trust
brian m. carlson
- kernel.org status: establishing a PGP web of trust
Peter Lebbing
- kernel.org status: establishing a PGP web of trust
Robert J. Hansen
- kernel.org status: establishing a PGP web of trust
Aaron Toponce
- kernel.org status: establishing a PGP web of trust
Jerome Baum
- kernel.org status: establishing a PGP web of trust
Robert J. Hansen
- Key revocation UI confusion
Andy Bennett
- Key revocation UI confusion
Ben McGinnes
- Key revocation UI confusion
MFPA
- Key revocation UI confusion
Ben McGinnes
- Key revocation UI confusion
Michel Messerschmidt
- Key revocation UI confusion
Ben McGinnes
- Key revocation UI confusion
Andy Bennett
- Key revocation UI confusion
MFPA
- key selection in batch decryptions
John A. Wallace
- key selection in batch decryptions
Werner Koch
- key selection in batch decryptions
vedaal at nym.hush.com
- KeyServer...
Laurent Jumet
- KeyServer...
Aaron Toponce
- MS Exchange server corrupting PGP-MIME emails
David Smith
- MS Exchange server corrupting PGP-MIME emails
Daniel Kahn Gillmor
- MS Exchange server corrupting PGP-MIME emails
Phil Brooke
- MS Exchange server corrupting PGP-MIME emails
Robert J. Hansen
- MS Exchange server corrupting PGP-MIME emails
Jerry
- MS Exchange server corrupting PGP-MIME emails
Alex (via GPGTools)
- MS Exchange server corrupting PGP-MIME emails
Werner Koch
- MS Exchange server corrupting PGP-MIME emails
Ludwig Hügelschäfer
- MS Exchange server corrupting PGP-MIME emails
Jerry
- MS Exchange server corrupting PGP-MIME emails
Ludwig Hügelschäfer
- MS Exchange server corrupting PGP-MIME emails
Jerry
- MS Exchange server corrupting PGP-MIME emails
Peter Lebbing
- MS Exchange server corrupting PGP-MIME emails
Peter Lebbing
- MS Exchange server corrupting PGP-MIME emails
Daniel Kahn Gillmor
- MS Exchange server corrupting PGP-MIME emails
Peter Lebbing
- MS Exchange server corrupting PGP-MIME emails
Werner Koch
- MS Exchange server corrupting PGP-MIME emails
Phil Brooke
- MS Exchange server corrupting PGP-MIME emails
Phil Brooke
- MS Exchange server corrupting PGP-MIME emails
Peter Lebbing
- Multiple signatures
pet jemen
- Multiple signatures
Aaron Toponce
- Multiple signatures
David Shaw
- Multiple signatures
Doug Barton
- Multiple signatures
Aaron Toponce
- Multiple signatures
pjemen
- Multiple signatures
Werner Koch
- no, you can't
M.R.
- private key protection
takethebus at gmx.de
- private key protection
Robert J. Hansen
- private key protection
Anthony Papillion
- private key protection
Jerome Baum
- private key protection
Anthony Papillion
- private key protection
Anthony Papillion
- private key protection
Derick Centeno
- private key protection
Doug Barton
- private key protection
Jerome Baum
- private key protection
Robert J. Hansen
- private key protection
Jerome Baum
- private key protection
Peter Lebbing
- private key protection
takethebus at gmx.de
- private key protection
Robert J. Hansen
- private key protection
Peter Lebbing
- private key protection
Jerome Baum
- private key protection
Robert J. Hansen
- private key protection
Mark H. Wood
- private key protection
Robert J. Hansen
- private key protection
Jerome Baum
- private key protection
Peter Lebbing
- private key protection
Jerome Baum
- private key protection
Peter Lebbing
- private key protection
Peter Lebbing
- private key protection
Peter Lebbing
- private key protection
Jerome Baum
- private key protection
Robert J. Hansen
- private key protection
takethebus at gmx.de
- private key protection
Jerome Baum
- private key protection
Peter Lebbing
- private key protection
Werner Koch
- private key protection
Jerome Baum
- private key protection
Werner Koch
- private key protection
Jerome Baum
- private key protection
Mark H. Wood
- private key protection
Jerome Baum
- private key protection
Derick Centeno
- private key protection
Faramir
- private key protection
Peter Lebbing
- private key protection
Robert J. Hansen
- private key protection
Faramir
- private key protection
Robert J. Hansen
- Problems with clearsign option
cord-henning.fricke at f-i.de
- Question regarding unknown certificates
Jerry
- Question regarding unknown certificates
Werner Koch
- restoring SmartCard key with off-card copy
Faramir
- restoring SmartCard key with off-card copy
Peter Lebbing
- restoring SmartCard key with off-card copy
Laurent Jumet
- restoring SmartCard key with off-card copy
Robert J. Hansen
- restoring SmartCard key with off-card copy
Peter Lebbing
- restoring SmartCard key with off-card copy
Achim Cloer
- restoring SmartCard key with off-card copy
Peter Lebbing
- restoring SmartCard key with off-card copy
Faramir
- rfc 4880 // armor headers and footers
vedaal at nym.hush.com
- rfc 4880 // armor headers and footers
Werner Koch
- Sign a multipart/alternative mail
Pascal Nitsche
- Sign a multipart/alternative mail
Ingo Klöcker
- signing party: webserver software for key submission?
Fraser Tweedale
- signing party: webserver software for key submission?
Jerome Baum
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Jerry
- STEED - Usable end-to-end encryption
Aaron Toponce
- STEED - Usable end-to-end encryption
Ben McGinnes
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Aaron Toponce
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Simon Josefsson
- STEED - Usable end-to-end encryption
Melvin Carvalho
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Robert Holtzman
- STEED - Usable end-to-end encryption
Martin Gollowitzer
- STEED - Usable end-to-end encryption
yyy
- STEED - Usable end-to-end encryption
Tom Ritter
- STEED - Usable end-to-end encryption
Alex (via GPGTools)
- STEED - Usable end-to-end encryption
Harakiri
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
MFPA
- STEED - Usable end-to-end encryption
smu johnson
- STEED - Usable end-to-end encryption
Ingo Klöcker
- STEED - Usable end-to-end encryption
MFPA
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Jerome Baum
- STEED - Usable end-to-end encryption
Hubert Kario
- STEED - Usable end-to-end encryption
MFPA
- STEED - Usable end-to-end encryption
Marcus Brinkmann
- STEED - Usable end-to-end encryption
Bernd Eckenfels
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Matthias-Christian Ott
- STEED - Usable end-to-end encryption
Marcus Brinkmann
- STEED - Usable end-to-end encryption
Werner Koch
- STEED - Usable end-to-end encryption
Johan Wevers
- STEED - Usable end-to-end encryption
Jean-David Beyer
- STEED - Usable end-to-end encryption
Christophe Brocas
- STEED - Usable end-to-end encryption
MFPA
- STEED - Usable end-to-end encryption
Matthias-Christian Ott
- STEED - Usable end-to-end encryption
Marcus Brinkmann
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Jean-David Beyer
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Jerry
- STEED - Usable end-to-end encryption
Peter Lebbing
- STEED - Usable end-to-end encryption
Mark H. Wood
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
gnupg at lists.grepular.com
- STEED - Usable end-to-end encryption
MFPA
- STEED - Usable end-to-end encryption
Doug Barton
- STEED - Usable end-to-end encryption
Robert J. Hansen
- STEED - Usable end-to-end encryption
Devin Fisher
- STEED - Usable end-to-end encryption
dan at geer.org
- The problem is "motivational"
M.R.
- The problem is "motivational"
Werner Koch
- The problem is "motivational"
Robert J. Hansen
- The problem is "motivational"
Mark H. Wood
- The problem is "motivational"
Mark H. Wood
- The problem is "motivational"
Mark H. Wood
- The problem is "motivational"
M.R.
- The problem is "motivational"
Robert J. Hansen
- The problem is "motivational"
Jean-David Beyer
- The problem is "motivational"
MichaelQuigley at TheWay.Org
- unsubscribe
Sethukumar.R at sungard.com
- use key, not passphrase, in symmetric encryption
sweepslate
- use key, not passphrase, in symmetric encryption
Doug Barton
- use key, not passphrase, in symmetric encryption
sweepslate
- use key, not passphrase, in symmetric encryption
Robert J. Hansen
- use key, not passphrase, in symmetric encryption
Hauke Laging
- use key, not passphrase, in symmetric encryption
David Tomaschik
- use key, not passphrase, in symmetric encryption
sweepslate
- use key, not passphrase, in symmetric encryption
sweepslate
- Useful factoid
Robert J. Hansen
- Useful factoid
Jean-David Beyer
- Useful factoid
MFPA
- Useful factoid
Aaron Toponce
- Useful factoid
Robert J. Hansen
- Useful factoid
Jerome Baum
- Useful factoid
Robert J. Hansen
- Useful factoid
Jerome Baum
- Useful factoid
Robert J. Hansen
- Useful factoid
Melvin Carvalho
- Useful factoid
Jean-David Beyer
- Useful factoid
Robert J. Hansen
- Useful factoid
Jerry
- Useful factoid
Michel Messerschmidt
- Why do I receive keys I wouldn't expect
Martin Jachs
- Why do I receive keys I wouldn't expect
Andy Bennett
- Why do I receive keys I wouldn't expect
David Shaw
- Why revoke a key?
takethebus at gmx.de
- Why revoke a key?
Johan Wevers
- Why revoke a key?
Robert J. Hansen
- Why revoke a key?
David Manouchehri
- Why revoke a key?
Doug Barton
- Why revoke a key?
Jan Janka
- Why revoke a key?
Jerome Baum
- Why revoke a key?
Ivan Shmakov
- Why revoke a key?
Robert J. Hansen
- Why revoke a key?
David Tomaschik
- Why revoke a key?
Jean-David Beyer
- Why revoke a key?
Robert J. Hansen
- Why revoke a key?
Avi
- Why revoke a key?
Jerome Baum
- Why revoke a key?
Jerome Baum
- Why revoke a key?
Jan Janka
- Win7: Kleopatra does not open
Roland Siemons (P)
- Win7: Kleopatra does not open
Hubert Kario
- Win7: Kleopatra does not open
Richard
- Win7: Kleopatra does not open
yyy
- Win7: Kleopatra does not open
David Manouchehri
Last message date:
Mon Oct 31 21:08:06 CET 2011
Archived on: Tue Nov 1 12:04:09 CET 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).