FAQ: Re: key length

Werner Koch wk at gnupg.org
Fri Aug 8 10:44:01 CEST 2014

On Fri,  8 Aug 2014 09:45, bernhard at intevation.de said:

> So what is the common weakest link then? 
> The symmetric cipher, the entropy source, the implementation issues in 
> software and hardware (like side channel attacks)? 

The ubiquitous exploitable bugs in all software, the OS, the MUAs, the
"apps", the browser running foreign code on your box, social
engineering, etc.

> OpenPGP system to be so strong that is provides 10 years security.
> At least my actions I can control.

Never connect to the Net and you have a chance to control things.



Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

More information about the Gnupg-devel mailing list