Someone has harvested my address
Robert J. Hansen
rjh at sixdemonbag.org
Tue Sep 9 23:32:08 CEST 2008
David Shaw wrote:
>> The conversation we're not having, which I think we should be
>> having, is "how can we have trusted communications on a hostile
>> network when we don't know if we really control our own PCs?"
> You can't, of course, so it would be a short conversation :)
Well, yes, but that's kind of not really what I was aiming to start. :)
When confronted with the fact many PCs (typically Win32, but there's no
reason to think exclusively so) are compromised without us knowing it,
what then should our response to it be in terms of effective usage of GnuPG?
(My answer is 'use OS X and/or Linux, and always suspect the endpoints
are leaky'. Other people's may differ, of course.)
More information about the Gnupg-users