secrets lying around on the HD

Per Tunedal Casual pt at
Tue Apr 13 19:37:42 CEST 2004

Hash: SHA1

At 15:50 2004-04-13, you wrote:
 >On Tue, 13 Apr 2004 14:55:33 +0200, Per Tunedal Casual said:
 >> What about virtual memory (SWAP-files) in Windows?
 >That may indeed happen and we can't do anything about it.  The only
 >possible solution is to write a device driver and let it allocate
 >memory for secrets.  This memory will then be managed via ioctls.
 >There is one such driver available but it is not Free Software so we
 >have not looked deeper into it.
 >There are currently rumors that the W32 API VirtualLock does indeed
 >lock pages against paging - if this is true we will ad this to the
 >next GnuPG version.
 >  Werner

Fine. I asked all these questions because I suddenly realised that things
like e.g. choosing a safe algo is all in vane if someone easily can bypass
the encryption. By e.g. finding unencrypted keys or the encrypted file in
plaintext on the computer.
Per Tunedal

Version: GnuPG v1.2.4 (MingW32) - GPGrelay v0.94


More information about the Gnupg-users mailing list