-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
In article <
hfydnaUN_OoTg6nF...@earthlink.com>
Dänk 42Ø <
da...@coffee.amsterdam.com> wrote:
>
> I dug out an ancient 1995 laptop with no wifi or internet connection. I
> am currently installing Debian 8.6.0 XFCE from a CD-R. Tomorrow I will
> install the latest GPG 2.1.16 testing without the compromised ECC
> function from NIST/NSA (same thing). ....
I've been content with the earlier GPG, no ECC stuff. So has that
ECC stuff has been officially declared no good now?
> My plan is to generate several dozen 4096 GPG keys (do they go higher?).
I think that 4096 is the highest they'll go. If they could go
higher I'd use that.
> Totally offline, and I don't care if takes months to generate them. I
> figure that every microprocessor since 1995 has been compromised by the
> NSA, which is why I dug out that ancient laptop. ....
Why do you choose 1996, as the date of universal CPU compromise?
> The goddamn CD-Rom is still installing Debian 8 to the 6G hard drive!
I think I have one of those around here. It is really slow, and I
don't think they have thumb drives that small anymore LOL.
> This could take all night! And another month to generate all the keys
> I might want to use in the future.
But if you're right it may be worth it.
> Can GPG 2.1.16 testing generate uncompromised keys on such an old
> computer? Also, for fixed (single-key) file encryption, which of the
> various algorithms do y'all recommend? Anything with the remotest
> connection to the U.S. government is unacceptable.
I assume you mean you're asking about symmetric encryption. I think
that "remotest connection" knocks out everything. Some good ones
have tried to get chosen for the replacement for AES256. Maybe
choose one of those after they were rejected. They wouldn't be
under the control of the NIST/NSA after they were rejected. Their
authors may have even made them stronger.
Paranoid Pete
-----BEGIN PGP SIGNATURE-----
Version: N/A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=5D7l
-----END PGP SIGNATURE-----