Secure unattended decryption

FederalHill federalhillrent at
Fri Mar 19 22:36:53 CET 2010

Are there refernces where such procedures are detailed that I might look at?


--- On Fri, 3/19/10, Robert J. Hansen <rjh at> wrote:

From: Robert J. Hansen <rjh at>
Subject: Re: Secure unattended decryption
To: gnupg-users at
Date: Friday, March 19, 2010, 5:30 PM

On 3/19/2010 4:26 PM, eggled at wrote:
> Yes, well, changing the AES key on a database (Which may be several
> hundred gigabytes) is time consuming.

Only if you design your database poorly.  This is a solved problem in
both database design and filesystem design.

-----Inline Attachment Follows-----

Gnupg-users mailing list
Gnupg-users at

-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20100319/cc14dc17/attachment.htm>

More information about the Gnupg-users mailing list