Security of the gpg private keyring?

Grant Olson kgo at
Tue Mar 1 03:22:33 CET 2011

On 02/28/2011 09:08 PM, Robert J. Hansen wrote:
>> There are probably many more issues like that tucked away once you start
>> to think seriously about implementing the feature properly.
> There's a lot of stuff in the literature on this subject.  This sort of behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring usually to intelligence so sensitive the source controls who sees the intel and how it is used.
> The first paper I can find on this subject belongs to Graubert, "On the Need for a Third Form of Access Control," _Proceedings of the 12th National Computer Security Conference_.  It's worth reading.

Thanks for the heads up.  Looks interesting.


"Look around! Can you construct some sort of rudimentary lathe?"

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 565 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20110228/1ab38ac3/attachment.pgp>

More information about the Gnupg-users mailing list