Implications of using insecure memory

shatadal at shatadal at
Mon Oct 4 04:56:32 CEST 2004

Quoting Atom 'Smasher' <atom at>:

> Hash: SHA256
> On Sat, 2 Oct 2004 shatadal at wrote:
> > As a new user I want to know what are the implications of using gpg with
> > insecure memory in windows and linux, how serious are they and what
> > steps can I take to improve security? Does insecure memory mean that I
> > should not use gpg on sych systems?
> =================
> it means that sensitive information, such as a passphrase or secret key
> *might* be written to a disk swap space. if that happens, and someone
> stole your HD, they could search the disk and maybe find something that
> could compromise your key.
> i dunno about windoze, but on *nix you can solve this by setuid-ing the
> gpg binary... that would force it to only use secure memory (RAM) and not
> write to disk swap.
>   	...atom


I use windows. Does that mean that I should not use gpg on windows? Or should I
install some utility to wipe the disc swap space and use it every time after I
have used gpg? Could you point me to any program which does this?

This mail sent through Virus Free Email

More information about the Gnupg-users mailing list