Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 740  |
|  Wilfred van Velzen to August Abolins  |
|  Re: who would fall for this?  |
|  02 Mar 21 17:32:07  |
 TID: FMail-lnx64 2.1.0.18-B20170815 RFC-X-No-Archive: Yes TZUTC: 0100 CHRS: UTF-8 2 PID: GED+LNX 1.1.5-b20161221 MSGID: 2:280/464 603e6c48 REPLY: 2:221/1.58@fidonet ee0f7510 Hi August, On 2021-03-02 09:16:00, you wrote to me: WvV>> Sometimes you "need" to save it without a WvV>> password when you need to use it from automated scripts. AA> Scripting.. never thought of that. But I seem to recall that AA> there are ways to pass the passphrase via a variable or AA> something which would be better than having no passphrase at AA> all. Yes. But it's more work... People are lazy. WvV>> And when a key has a simple password, it would be possible WvV>> to brute force finding the password... AA> I wish I could remember what I used for: AA> pub 512R/246249F7 1994-02-16 AA> Fingerprint=BC 1B B6 D5 15 AC F1 D4 F2 B4 0F A2 D6 31 7F 53 AA> I'm pretty sure that's me as "abolins" when you do a key search. AA> I know that I have the private key stored on a 3.5" diskette - AA> somewhere. I used pgp to email TODO lists to myself from home AA> to work and back. I don't think I could brute force the secret AA> if I tried. It was a modified latvian phrase. The key is what AA> did I do to tweak the phrase? Talk to your local NSA office. Maybe they can help? ;-) Bye, Wilfred. --- FMail-lnx64 2.1.0.18-B20170815 * Origin: FMail development HQ (2:280/464) SEEN-BY: 1/123 90/1 105/81 120/340 123/131 124/5016 154/10 203/0 221/0 SEEN-BY: 226/30 227/114 702 229/101 424 426 664 1016 1017 240/5832 SEEN-BY: 249/110 206 317 400 280/464 5003 282/1038 288/100 292/854 SEEN-BY: 292/8125 310/31 317/3 322/757 342/200 396/45 423/120 712/848 SEEN-BY: 770/1 2452/250 PATH: 280/464 229/101 426 |
[ << oldest | < older | list | newer > | newest >> ]