Security of the gpg private keyring?
kgo at grant-olson.net
Tue Mar 1 03:22:33 CET 2011
On 02/28/2011 09:08 PM, Robert J. Hansen wrote:
>> There are probably many more issues like that tucked away once you start
>> to think seriously about implementing the feature properly.
> There's a lot of stuff in the literature on this subject. This sort of behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring usually to intelligence so sensitive the source controls who sees the intel and how it is used.
> The first paper I can find on this subject belongs to Graubert, "On the Need for a Third Form of Access Control," _Proceedings of the 12th National Computer Security Conference_. It's worth reading.
Thanks for the heads up. Looks interesting.
"Look around! Can you construct some sort of rudimentary lathe?"
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 565 bytes
Desc: OpenPGP digital signature
More information about the Gnupg-users