Fri May 25 23:05:01 2001
On Fri, 25 May 2001, David Turner wrote:
> Or something similar. There is even a vulnerability in OpenPGP that if
> you can replace a secret key temporarily then intercept a badly-signed
> message, you can get the true secret key. But that involves actually
and that involves that the user has to type his passphrase. BTW,
this does not work with gpg 1.0.5 anymore.
> Didn't know this. How? (Reply directly if this is too OT for the list)
struct rlimit limit;
limit.rlim_cur = 0;
limit.rlim_max = 0;
if( setrlimit( RLIMIT_CORE, &limit ) )
return -1; /*failed*/
Werner Koch Omnis enim res, quae dando non deficit, dum habetur
g10 Code GmbH et non datur, nondum habetur, quomodo habenda est.
Privacy Solutions -- Augustinus