From: Gordon W. <re...@rb...> - 2001-05-25 03:15:58
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Okay, today I was cleaning my desk and found a print out of an old e-mail from the mac security list with shell scripts for encrypting and decrypting the pastboard in OS X. Well, I started to play and discovered this: pbpaste | native2ascii | gpg --se > /tmp/enc-file.gpg; cat /tmp/enc-file.gpg | pbcopy and this: pbpaste | native2ascii > /tmp/enc-file.gpg; gpg -d < /tmp/enc-file.gpg | pbcopy which means that clear text never has to be written to disk (well, except when clear signing, but in that case it doesn't matter)! This is great. So long as we keep the memory secure, there won't be any trouble at all with doing things this sort of hackish way. :-) Only encrypted text will ever be written to disk, which is just fine, since it's not usable anyway. :-) Hopefully others have figured this out, but when I saw it I was very happy. This means that providing services will be no trouble at all and we can focus on writing a good front end. :-) Now, if I've missed something important, please bust my bubble. I have this working, but maybe it won't work in the context of a service. :-( - -- Gordon Worley http://www.rbisland.cx/ mailto:re...@rb... PGP Fingerprint: C462 FA84 B811 3501 9010 20D2 6EF3 77F7 BBD3 B003 -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQA/AwUBOw3OUm7zd/e707ADEQL3uwCghTUJZFPs+isjoT4MHcV5OeogInAAnAur IKaIccASg+J0Po9+oa9K67me =XXlQ -----END PGP SIGNATURE----- |