How to verify the file was successfully encrypted...

Samuel ]slund samuel at Update.UU.SE
Thu Jul 13 23:15:42 CEST 2006

On Wed, Jul 12, 2006 at 10:59:52AM -0600, Benny Helms wrote:
> On Wed, 2006-07-12 at 12:25 +0200, Janusz A. Urbanowicz wrote:
> > On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote:
> <snip>
> > What is your actual threat model here?
> > 
> > The simplest answer is to check gpg's rc after the encryption run.
> Before deleting original file, I must make certain encrypted version is
> in good shape so I can open it at a later date and obtain data.  If it
> is broken, I'm in deep monkey muffins.  That's the threat model.

If I read this thread right you actually wnt to make a decryption and 
compare the results and you do _not_ want to keep the private key on 
that machine.

Could you do something creative with --show-session-key to be able to 
decrypt each file once w.o. risking your private key?


More information about the Gnupg-users mailing list