From: bwp@mindvox.phantom.com (Jane Doe)
To: cypherpunks@toad.com
Message Hash: ae6300d8dcddacc51a908002401880b9a09d54f802c1c0711dfcd733e0131dad
Message ID: <HH508B1w165w@mindvox.phantom.com>
Reply To: N/A
UTC Datetime: 1993-08-14 15:56:42 UTC
Raw Date: Sat, 14 Aug 93 08:56:42 PDT
From: bwp@mindvox.phantom.com (Jane Doe)
Date: Sat, 14 Aug 93 08:56:42 PDT
To: cypherpunks@toad.com
Subject: User suggestion on MacPGP
Message-ID: <HH508B1w165w@mindvox.phantom.com>
MIME-Version: 1.0
Content-Type: text/plain
One of the best improvements implemented in MacPGP 2.3 was the ability for
the user to enable an option that let PGP keep the key passphrase in
memory so you don't have to re-type it each message. However, I have ran
up against two problems with its implementation.
1). if you mis-type the passphrase, the incorrect phrase goes into memory
and MacPGP takes it instead of putting back up a dialog box for you to
re-try. The result of any mis-typed passphrase is therfore a bad
passphrase error that you cannot recover from except by quitting and
re-starting MacPGP.
2). if you try to generate another key pair after typing (or mis-typing) a
passphrase, MacPGP takes the passphrase from memory and automatically
applies it to the new secret key. This is inconvenient especially if the
mis-typed phrase is so badly munged that the user cannot remember what
she typed ;-).
-bwp
Return to August 1993
Return to “bwp@mindvox.phantom.com (Jane Doe)”
1993-08-14 (Sat, 14 Aug 93 08:56:42 PDT) - User suggestion on MacPGP - bwp@mindvox.phantom.com (Jane Doe)