Robert J. Hansen rjh at
Tue Nov 4 15:18:22 CET 2008

> Hey, that sounds like a key distribution problem!

It is, quite literally.  The scheme can be thought of as a message  
authentication code (MAC), with a shared key that has to be negotiated  
ahead of time; and just like with a MAC, anyone who has the secret key  
is capable of forging the message.

More information about the Gnupg-users mailing list