How to verify the file was successfully encrypted...
samuel at Update.UU.SE
Thu Jul 13 23:15:42 CEST 2006
On Wed, Jul 12, 2006 at 10:59:52AM -0600, Benny Helms wrote:
> On Wed, 2006-07-12 at 12:25 +0200, Janusz A. Urbanowicz wrote:
> > On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote:
> > What is your actual threat model here?
> > The simplest answer is to check gpg's rc after the encryption run.
> Before deleting original file, I must make certain encrypted version is
> in good shape so I can open it at a later date and obtain data. If it
> is broken, I'm in deep monkey muffins. That's the threat model.
If I read this thread right you actually wnt to make a decryption and
compare the results and you do _not_ want to keep the private key on
Could you do something creative with --show-session-key to be able to
decrypt each file once w.o. risking your private key?
More information about the Gnupg-users