Dänk 42Ø
2016-11-22 10:32:38 UTC
I dug out an ancient 1995 laptop with no wifi or internet connection. I
am currently installing Debian 8.6.0 XFCE from a CD-R. Tomorrow I will
install the latest GPG 2.1.16 testing without the compromised ECC
function from NIST/NSA (same thing). (Ironically, the only thing I
trust NIST for is to give me the correct atomic time of day.)
My plan is to generate several dozen 4096 GPG keys (do they go higher?).
Totally offline, and I don't care if takes months to generate them. I
figure that every microprocessor since 1995 has been compromised by the
NSA, which is why I dug out that ancient laptop. (Never throw seemingly
obsolete electronics away -- stick them in a Faraday Cage just in case).
The goddamn CD-Rom is still installing Debian 8 to the 6G hard drive!
This could take all night! And another month to generate all the keys
I might want to use in the future.
Can GPG 2.1.16 testing generate uncompromised keys on such an old
computer? Also, for fixed (single-key) file encryption, which of the
various algorithms do y'all recommend? Anything with the remotest
connection to the U.S. government is unacceptable.
am currently installing Debian 8.6.0 XFCE from a CD-R. Tomorrow I will
install the latest GPG 2.1.16 testing without the compromised ECC
function from NIST/NSA (same thing). (Ironically, the only thing I
trust NIST for is to give me the correct atomic time of day.)
My plan is to generate several dozen 4096 GPG keys (do they go higher?).
Totally offline, and I don't care if takes months to generate them. I
figure that every microprocessor since 1995 has been compromised by the
NSA, which is why I dug out that ancient laptop. (Never throw seemingly
obsolete electronics away -- stick them in a Faraday Cage just in case).
The goddamn CD-Rom is still installing Debian 8 to the 6G hard drive!
This could take all night! And another month to generate all the keys
I might want to use in the future.
Can GPG 2.1.16 testing generate uncompromised keys on such an old
computer? Also, for fixed (single-key) file encryption, which of the
various algorithms do y'all recommend? Anything with the remotest
connection to the U.S. government is unacceptable.