August 2014 Archives by date
Starting: Fri Aug 1 10:31:05 CEST 2014
Ending: Sun Aug 31 23:27:23 CEST 2014
Messages: 388
- gpg: checking created signature failed: Bad signature
Bernhard Reiter
- gpg: checking created signature failed: Bad signature
green at mm.st
- gpg: checking created signature failed: Bad signature
Werner Koch
- gpg: checking created signature failed: Bad signature
green at mm.st
- gpg: checking created signature failed: Bad signature
michael crane
- gpg: checking created signature failed: Bad signature
Peter Lebbing
- gpg: checking created signature failed: Bad signature
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- draft-wouters-dane-openpgp-02
Stephen Nightingale
- gpg: checking created signature failed: Bad signature
Heinz Diehl
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Werner Koch
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- GnuPG 2.0.21 install - AIX
Ashok Boppana
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- GnuPG 2.0.21 install - AIX
Tristan Santore
- GnuPG 2.0.21 install - AIX
Sieu Truc
- gpg: checking created signature failed: Bad signature
green at mm.st
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Werner Koch
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- [Announce] GnuPG is NOT vulnerable to -Get Your Hands Off My Laptop-
Werner Koch
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Kristian Fiskerstrand
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- [Announce] [security] GPGME 1.5.1 and 1.4.4 released
Werner Koch
- [Announce] Libgcrypt 1.5.4 released
Werner Koch
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
MFPA
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Peter Lebbing
- [Announce] [security fix] Libgcrypt and GnuPG
Werner Koch
- googles End-To-End plugins opinions
Aleksandar Lazic
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- pinentry-curses and dumb terminals
Serge Voilokov
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Jeff Fisher
- How to preserve the permission/owner/group owner on the pubring.gpg, secring.gpg and trustdb.gpg
Sieu Truc
- gnupg - pgp reading signed files
Johan Wevers
- [Announce] [security fix] Libgcrypt and GnuPG
Pete Stephenson
- [Announce] [security fix] Libgcrypt and GnuPG
Samir Nassar
- [Announce] [security fix] Libgcrypt and GnuPG
Pete Stephenson
- gnupg - pgp reading signed files
Werner Koch
- [Announce] [security fix] Libgcrypt and GnuPG
Werner Koch
- Fwd: [Enigmail] [ANN] Enigmail v1.7 available
Johan Wevers
- Fwd: [Enigmail] [ANN] Enigmail v1.7 available
Kosuke Kaizuka
- Fwd: [Enigmail] [ANN] Enigmail v1.7 available
Samir Nassar
- [Announce] [security fix] Libgcrypt and GnuPG
Pete Stephenson
- [Announce] [security fix] Libgcrypt and GnuPG
Branko Majic
- Error - bad passphrase
david at gbenet.com
- Error - bad passphrase
Hauke Laging
- Why is the gpg-agent PID part of GPG_AGENT_INFO?
Hauke Laging
- Error in ASSUAN description: GET_PASSPHRASE
Hauke Laging
- Why is the gpg-agent PID part of GPG_AGENT_INFO?
Werner Koch
- Error - bad passphrase
david at gbenet.com
- Error - bad passphrase
Hauke Laging
- gnupg-2.1 Install
Murphy
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Robert J. Hansen
- Error - bad passphrase
david at gbenet.com
- [Announce] [security fix] Libgcrypt and GnuPG
Werner Koch
- Error - bad passphrase
Philip Jackson
- AW: [Announce] [security fix] Libgcrypt and GnuPG
KA IT User
- gnupg-2.1 Install
Werner Koch
- FAQ change, final draft
Robert J. Hansen
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Johan Wevers
- gnupg-2.1 Install
Murphy
- gnupg-2.1 Install
Robert J. Hansen
- FAQ change, final draft
Paul R. Ramer
- gnupg-2.1 Install
Philip Jackson
- [Announce] [security fix] Libgcrypt and GnuPG
Jerry
- [openpgp] SHA-2 support should be mandatory – change defaults
Werner Koch
- AW: [Announce] [security fix] Libgcrypt and GnuPG
Werner Koch
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
David Shaw
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Robert J. Hansen
- gnupg-2.1 Install
Murphy
- Error - bad passphrase
Hauke Laging
- [openpgp] SHA-2 support should be mandatory – change defaults
Werner Koch
- can any one send me....
david at gbenet.com
- Error - bad passphrase
david at gbenet.com
- can any one send me....
Peter Lebbing
- gpg: checking created signature failed: Bad signature
green at mm.st
- gnupg-2.1 Install
Werner Koch
- Different signing & encryption keys
Phillip Susi
- Error - bad passphrase
Ludwig Hügelschäfer
- [Announce] GnuPG 2.0.26 released
Werner Koch
- Different signing & encryption keys
Peter Lebbing
- Different signing & encryption keys
Werner Koch
- keys.gnupg.net - Refresh all public keys never completes in Enigmail, some servers down?
OmegaPhil
- FAQ change, final draft
MFPA
- FAQ change, final draft
Peter Lebbing
- FAQ change, final draft
Robert J. Hansen
- FAQ change, final draft
Robert J. Hansen
- FAQ change, final draft
Doug Barton
- [Announce] [security fix] Libgcrypt and GnuPG
Doug Barton
- [Announce] [security fix] Libgcrypt and GnuPG
Robert J. Hansen
- [Announce] [security fix] Libgcrypt and GnuPG
Werner Koch
- automatically add the passphrase for other (sub)keys of the same certificate
Hauke Laging
- Different signing & encryption keys
Phillip Susi
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
David Shaw
- Requesting public key with GnuPG 1.4.18
Laurent Jumet
- Different signing & encryption keys
Robert J. Hansen
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Johan Wevers
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
vedaal at nym.hush.com
- what is "correct" for users' Preferred keyserver ?
shmick at riseup.net
- [2] cipher when viewing key prefs
shmick at riseup.net
- gpg --verify email.eml
shmick at riseup.net
- Different signing & encryption keys
Werner Koch
- [openpgp] SHA-2 support should be mandatory – change defaults
Werner Koch
- Requesting public key with GnuPG 1.4.18
Werner Koch
- [openpgp] SHA-2 support should be mandatory – change defaults
Werner Koch
- [2] cipher when viewing key prefs
Werner Koch
- Gnupg-users Digest, Vol 131, Issue 15
Michael Anders
- Seeking clarification with a few GPG concepts
pzeudo at hushmail.com
- Different signing & encryption keys
Philip Jackson
- Requesting public key with GnuPG 1.4.18
Laurent Jumet
- Seeking clarification with a few GPG concepts
pzeudo at hushmail.com
- Different signing & encryption keys
Peter Lebbing
- Different signing & encryption keys
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Hauke Laging
- Seeking clarification with a few GPG concepts
Hauke Laging
- Seeking clarification with a few GPG concepts
pzeudo at hushmail.com
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
pzeudo at hushmail.com
- Gnupg-users Digest, Vol 131, Issue 15
Robert J. Hansen
- Seeking clarification with a few GPG concepts
Hauke Laging
- Seeking clarification with a few GPG concepts
Peter Lebbing
- James Mickens on security
Robert J. Hansen
- FAQ change, final draft
Bob (Robert) Cavanaugh
- Back to normal now
david at gbenet.com
- Gnupg-users Digest, Vol 131, Issue 15
Bob (Robert) Cavanaugh
- FAQ change, final draft
Robert J. Hansen
- Back to normal now
Schlacta, Christ
- FAQ change, final draft
Werner Koch
- HP-UX and GnuPG
Bill HT
- Seeking clarification with a few GPG concepts
MFPA
- keys.gnupg.net - Refresh all public keys never completes in Enigmail, some servers down?
Kristian Fiskerstrand
- FAQ change, final draft
Martin Behrendt
- Seeking clarification with a few GPG concepts
MFPA
- Seeking clarification with a few GPG concepts
MFPA
- Seeking clarification with a few GPG concepts
David Shaw
- Seeking clarification with a few GPG concepts
Hauke Laging
- FAQ change, final draft
Robert J. Hansen
- what is "correct" for users' Preferred keyserver ?
Doug Barton
- gpg --recv-key rejects a key
Ineiev
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Doug Barton
- FAQ change, final draft
Werner Koch
- [openpgp] SHA-2 support should be mandatory – change defaults
Heinz Diehl
- gpg --recv-key rejects a key
Werner Koch
- FAQ change, final draft
Martin Behrendt
- [openpgp] SHA-2 support should be mandatory – change defaults
Werner Koch
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Seeking clarification with a few GPG concepts
Peter Lebbing
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
David Shaw
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
David Shaw
- Seeking clarification with a few GPG concepts
David Shaw
- what is "correct" for users' Preferred keyserver ?
David Shaw
- what is "correct" for users' Preferred keyserver ?
David Shaw
- HP-UX and GnuPG
David Shaw
- FAQ change, final draft
Robert J. Hansen
- FAQ change, final draft
Robert J. Hansen
- FAQ change, final draft
Peter Lebbing
- [Announce] The sixth Beta for GnuPG 2.1 is now available for testing
Werner Koch
- keys.gnupg.net - Refresh all public keys never completes in Enigmail, some servers down?
OmegaPhil
- keys.gnupg.net - Refresh all public keys never completes in Enigmail, some servers down?
Kristian Fiskerstrand
- keys.gnupg.net - Refresh all public keys never completes in Enigmail, some servers down?
OmegaPhil
- FAQ change, final draft
Werner Koch
- FAQ change, final draft
Robert J. Hansen
- what is "correct" for users' Preferred keyserver ?
Doug Barton
- Re: [openpgp] SHA-2 support should be mandatory – change defaults
Doug Barton
- Seeking clarification with a few GPG concepts
MFPA
- Seeking clarification with a few GPG concepts
MFPA
- what is "correct" for users' Preferred keyserver ?
MFPA
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Peter Lebbing
- OpenPGP card feature request: as many encryption-capable keys as technically possible
NdK
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Andreas Schwier
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Peter Lebbing
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Andreas Schwier
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Peter Lebbing
- what is "correct" for users' Preferred keyserver ?
MichaelQuigley at TheWay.Org
- ICMP (was: Re: keys.gnupg.net - Refresh all public keys never completes in) Enigmail, some servers down?
Aaron Toponce
- Why does Enigmail keep asking for a passphrase for a secret key?
J. Tinsby
- ICMP
Robert J. Hansen
- ICMP (was: Re: keys.gnupg.net - Refresh all public keys never completes in) Enigmail, some servers down?
Doug Barton
- OpenPGP card feature request: as many encryption-capable keys as technically possible
NdK
- ICMP
Robert J. Hansen
- So on & so forth
Richard Outerbridge
- (OT) Re: ICMP
Peter Lebbing
- (OT) Re: ICMP
Robert J. Hansen
- ICMP
Robert J. Hansen
- ICMP
Aaron Toponce
- OpenPGP card feature request: as many encryption-capable keys as technically possible
Werner Koch
- (OT) Re: ICMP
Peter Lebbing
- It's time for PGP to die.
Kristy Chambers
- It's time for PGP to die.
Garreau, Alexandre
- It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
Nicholas Cole
- Fwd: It's time for PGP to die.
Garreau, Alexandre
- Fwd: It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
Heinz Diehl
- Mail header encryption (was Re: It's time for PGP to die.)
Peter Lebbing
- It's time for PGP to die.
david at gbenet.com
- It's time for PGP to die.
Werner Koch
- It's time for PGP to die.
Peter Lebbing
- It's time for PGP to die.
Heinz Diehl
- It's time for PGP to die.
Werner Koch
- Mail header encryption
Werner Koch
- Fwd: It's time for PGP to die.
Michael Anders
- Fwd: It's time for PGP to die.
Johan Wevers
- It's time for PGP to die.
MFPA
- Fwd: It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
MFPA
- It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
Johan Wevers
- AW: [Announce] The sixth Beta for GnuPG 2.1 is now available for testing
KA IT User
- Fwd: It's time for PGP to die.
Rob Ambidge
- It's time for PGP to die.
Nicholas Cole
- It's time for PGP to die.
Jerry
- AW: [Announce] The sixth Beta for GnuPG 2.1 is now available for testing
Kristian Fiskerstrand
- Fwd: It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
Robert J. Hansen
- [Announce] The sixth Beta for GnuPG 2.1 is now available for testing
Jerry
- It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
Martin Behrendt
- Fwd: It's time for PGP to die.
Mark H. Wood
- Fwd: It's time for PGP to die.
Aaron Toponce
- It's time for PGP to die
Michael Anders
- Fwd: It's time for PGP to die.
Mark H. Wood
- It's time for PGP to die.
Mark H. Wood
- Fwd: It's time for PGP to die.
Aaron Toponce
- It's time for PGP to die.
James Platt
- Fwd: It's time for PGP to die.
Peter Lebbing
- Fwd: It's time for PGP to die.
Johan Wevers
- Fwd: It's time for PGP to die.
Johan Wevers
- (OT) It's time for PGP to die.
Peter Lebbing
- It's time for PGP to die.
Peter Lebbing
- Fwd: It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
Robert J. Hansen
- It's time for PGP to die.
Kristian Fiskerstrand
- Fwd: It's time for PGP to die.
Johan Wevers
- It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
Bob Holtzman
- Fwd: It's time for PGP to die.
Robert J. Hansen
- So on & so forth
Nicholas Cole
- ftp.gnupg.org blocking Tor IP's?
Kristy Chambers
- So on & so forth
Ville Määttä
- So on & so forth
Werner Koch
- ftp.gnupg.org blocking Tor IP's?
Werner Koch
- So on & so forth
Robert J. Hansen
- It's time for PGP to die.
James Platt
- So on & so forth
Ville Määttä
- So on & so forth
Doug Barton
- So on & so forth
Robert J. Hansen
- Fwd: It's time for PGP to die.
MFPA
- It's time for PGP to die.
Johan Wevers
- Fwd: It's time for PGP to die.
Johan Wevers
- Fwd: It's time for PGP to die.
MFPA
- It's time for PGP to die.
MFPA
- It's time for PGP to die.
Martin Behrendt
- So on & so forth
Doug Barton
- So on & so forth
Hauke Laging
- So on & so forth
Ludwig Hügelschäfer
- So on & so forth
Ville Määttä
- So on & so forth
Werner Koch
- So on & so forth
Peter Lebbing
- Fwd: It's time for PGP to die.
Bob Holtzman
- It's time for PGP to die.
Robert J. Hansen
- So on & so forth
Doug Barton
- So on & so forth
Peter Lebbing
- Fwd: It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
MFPA
- Fwd: It's time for PGP to die.
Robert J. Hansen
- Fwd: It's time for PGP to die.
MFPA
- It's time for PGP to die.
Johan Wevers
- It's time for PGP to die.
MFPA
- It's time for PGP to die.
Robert J. Hansen
- So on & so forth
Ville Määttä
- So on & so forth
Ville Määttä
- So on & so forth
Doug Barton
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
david at gbenet.com
- [Announce] Libgcrypt 1.6.2 released
Werner Koch
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- [Announce] Libgcrypt 1.6.2 released
Shannon Crader
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
flapflap
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- [Announce] Libgcrypt 1.6.2 released
Robert J. Hansen
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Johannes Zarl
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Gabriel Niebler
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Filip M. Nowak
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Aaron Toponce
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Garreau, Alexandre
- email verification as casual checking?
Nicolai Josuttis
- email verification as casual checking?
Robert J. Hansen
- email verification as casual checking?
Doug Barton
- [Announce] [security fix] Libgcrypt and GnuPG
Branko Majic
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Rejo Zenger
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Charles Spitzer
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Doug Barton
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Garreau, Alexandre
- email verification as casual checking?
Nicolai Josuttis
- email verification as casual checking?
Doug Barton
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
dan at geer.org
- email verification as casual checking?
Daniel Kahn Gillmor
- email verification as casual checking?
Philip Jackson
- email verification as casual checking?
Mathias Bauer
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Garreau, Alexandre
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
dan at geer.org
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mirimir
- installing gnupg-2.0.26
Philip Jackson
- installing gnupg-2.0.26
Kristian Fiskerstrand
- installing gnupg-2.0.26
Philip Jackson
- installing gnupg-2.0.26
Peter Lebbing
- (OT) installing gnupg-2.0.26
Peter Lebbing
- default encrypt to multiple keys
Olav Seyfarth
- default encrypt to multiple keys
Kristian Fiskerstrand
- default encrypt to multiple keys
Olav Seyfarth
- (OT) installing gnupg-2.0.26
Werner Koch
- (OT) installing gnupg-2.0.26
Kristian fiskerstrand
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
MFPA
- (OT) installing gnupg-2.0.26
Peter Lebbing
- installing gnupg-2.0.26
Philip Jackson
- installing gnupg-2.0.26
Werner Koch
- installing gnupg-2.0.26
Philip Jackson
- installing gnupg-2.0.26
Doug Barton
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- installing gnupg-2.0.26
Werner Koch
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Jason Antony
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
dan at geer.org
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark H. Wood
- installing gnupg-2.0.26
Philip Jackson
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
shmick at riseup.net
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
shmick at riseup.net
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- installing gnupg-2.0.26
Werner Koch
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
MFPA
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
MFPA
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- installing gnupg-2.0.26
Philip Jackson
- Public Key Algorithms - GnuPG 2.x lists fewer than GnuPG 1.x
MFPA
- email verification as casual checking?
Steve Jones
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
MFPA
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Robert J. Hansen
- installing gnupg-2.0.26
Peter Lebbing
- Public Key Algorithms - GnuPG 2.x lists fewer than GnuPG 1.x
Werner Koch
- Public Key Algorithms - GnuPG 2.x lists fewer than GnuPG 1.x
Kristian Fiskerstrand
- email verification as casual checking?
Philip Jackson
- email verification as casual checking?
Steve Jones
- Public Key Algorithms - GnuPG 2.x lists fewer than GnuPG 1.x
Werner Koch
- Difference between clearsign and detached signatures?
TJ
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Samir Nassar
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back
Mark Rousell
- Difference between clearsign and detached signatures?
Ingo Klöcker
- Crypto Stick vs Smart Card Reader /w Pin Pad
Jonathan Brown
- default user and recipient
Herb Burnswell
- Fwd: default user and recipient
Herb Burnswell
- Difference between clearsign and detached signatures?
TJ
- default user and recipient
Ville Määttä
- Crypto Stick vs Smart Card Reader /w Pin Pad
Paul R. Ramer
- Difference between clearsign and detached signatures?
TJ
- default user and recipient
Robert J. Hansen
- Difference between clearsign and detached signatures?
Ingo Klöcker
- Difference between clearsign and detached signatures?
TJ
- default user and recipient
Herb Burnswell
- Difference between clearsign and detached signatures?
Ingo Klöcker
- default user and recipient
Laurent Jumet
- Patches gpg-agent + scute for ssl/tls auth using opengpg card with 2048 rsa key
Oliver Winker
- gnupg privicy assistant - card manager.
Paul Lewis
- Crypto Stick vs Smart Card Reader /w Pin Pad
Werner Koch
- Difference between clearsign and detached signatures?
TJ
- Smart Card 4096 Key Question
Jonathan Brown
- Smart Card 4096 Key Question
Tristan Santore
Last message date:
Sun Aug 31 23:27:23 CEST 2014
Archived on: Sun Aug 31 23:25:15 CEST 2014
This archive was generated by
Pipermail 0.09 (Mailman edition).