Gnupg-users Digest, Vol 104, Issue 37

Mike Acker Mike_Acker at
Tue May 29 18:12:39 CEST 2012

IMHO(FWIW) it is unlikely, at best, that anyone will attack your cipher
text.  haquers work by getting malware into the endpoint computers

hence it is that requiring signatures on software distributions is one
of the most critical topics on the table today


-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20120529/90dd9ff2/attachment.htm>

More information about the Gnupg-users mailing list