Results 15 comments of Eugene Chang

I am most interested in stats regarding underruns, overruns, and lost audio packets.

> 2. Generate a key for team and share it. Sharing a key is generally considered a bad idea. If one member is compromised, the key has to be revoked...

That is the idea. In this way, you always know: - who sent the email, - you can verify the email was not modified

Many years ago, checking the fingerprint was a tedious, manual process. Assuming you are using a mail reader that supports GPG (e.g. Outlook, Apple Mail), you would import the correspondent's...

I said it backwards. I don't know how may GPG plug-ins there are for mail readers.