Key Transition Letter 2009-05-21

gpg2.20.maniams at gpg2.20.maniams at
Fri May 22 07:47:44 CEST 2009

Dear Members

What are the algos that are compromised ? or NOT to be used ? If this is too
long a list

What are the Algos that are _to_be_
 _could_be_ used

I understand that choosing the key size and algo is something personal and
others cant decide..... but I'm trying to know the choice ....

-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20090522/31787761/attachment.htm>

More information about the Gnupg-users mailing list