Secure unattended decryption
FederalHill
federalhillrent at yahoo.com
Fri Mar 19 22:36:53 CET 2010
Are there refernces where such procedures are detailed that I might look at?
--- On Fri, 3/19/10, Robert J. Hansen <rjh at sixdemonbag.org> wrote:
From: Robert J. Hansen <rjh at sixdemonbag.org>
Subject: Re: Secure unattended decryption
To: gnupg-users at gnupg.org
Date: Friday, March 19, 2010, 5:30 PM
On 3/19/2010 4:26 PM, eggled at gmail.com wrote:
> Yes, well, changing the AES key on a database (Which may be several
> hundred gigabytes) is time consuming.
Only if you design your database poorly. This is a solved problem in
both database design and filesystem design.
-----Inline Attachment Follows-----
_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20100319/cc14dc17/attachment.htm>
More information about the Gnupg-users
mailing list