recovering a pgp private key [migrated]
My backup of my private key for my gpg key was deleted by mistake when I reinstalled kleopatra software and I need to get my PGP working again!
I need help, how can I recover my private key?
Collaborate Disseminate
My backup of my private key for my gpg key was deleted by mistake when I reinstalled kleopatra software and I need to get my PGP working again!
I need help, how can I recover my private key?
I’m trying to understand why it’s not necessary with MFA in 1Password when signing in to a new device.
This was the case that triggered my curiosity:
I created a 1Password account
I downloaded the Mac application
I installed the Chrome pl… Continue reading Why is 1Password sign-in to new device secure without MFA?
Background:
Setting up an organisational Exchange mail account on a private mobile phone (Android) using Active Sync, one has to accept quite extensive administrative rights for the Exchange mail server, including not only wiping the organ… Continue reading Limit admin rights requested by Exchange Active Sync mail account on mobile phone
I agree that – as always – having two protocols available potentially offers a greater attack surface than either of them. I know Active Sync allows to enforce organisational admin capabilities to wipe mobile devices, which may help for se… Continue reading Genuine security of IMAP vs Exchange Active Sync mail access
Several Windows apps come in both "installer" and "portable" forms, with the latter having the advantage that you can just download and run it from anywhere in the system.
Doesn’t being able to run them from anywhere in… Continue reading Are portable apps vulnerable to binary planting?
Disclaimer + Background
Since self signed certs are not that popular, here’s some context:
I have a 3rd party client/server application that we’re currently using (inside the LAN!) via unencrypted TCP/IP. (The protocol is proprietary, not … Continue reading Is there any point in separating private key gen for a self signed certificate?
According to the "Single sign-on" page on Wikipedia:
A simple version of single sign-on can be achieved over IP networks using cookies but only if the sites share a common DNS parent domain.
This means that if the user has auth… Continue reading Is it possible to use cookie-based single sign-on authentication scheme if sites do not share a common DNS parent domain?
We have some equipment that is linked to PC’s. These PC’s acquire data from the equipment that they send to a server through an internal network. Furthermore these PC’s are used to mediate instructions from network coupled PC’s to the equi… Continue reading Can a virus infection spread from a PC to a PCB and back to a PC?
Does it make any sense that a VPN provider (in this case VyprVPN, but this does not matter I am asking how to understand privacy claims in general, and what is considered as "log" data) claims (accessed here 2021-05-16)
Exceptio… Continue reading Definition of what is log data in context of VPN
https://haveibeenpwned.com/
Show my email accounts all pwned after even changed password two weeks ago though having 5 years not changed password last time
What can I do that it show pwned even if changed to a strong password with apple de… Continue reading What can I do after pwned?