Question about the following....

Jay Sulzberger jays at
Sun Feb 24 21:18:16 CET 2013

On Sat, 23 Feb 2013, Mark Campo <mdcampo at> wrote:

> Assume I had the GnuPG/PGP software.yet tell me how you would use GnuPG/PGP
> to encrypt the file and what instructions or methods you would need me to
> use to get the encrypted file and decrypt it on the recipients machine
> WITHOUT the recipient having GnuPG/PGP software loaded to the recipient
> system ... STEP BY STEP Instructions

Here is one answer:

1. Ship a device to your recipient, which has aboard the software
and your recipient's private key.  Here I make the assumption that
you have your recipient's public key and used it to send them an
encrypted message.

and here is another answer to a perhaps different question

2. Find out exactly what the formats are and what the
computations are, and then do them by hand.  Give your recipient
the formal definitions, and let your recipient write the needed

Both versions of your question are good, and thorough answers
would be of use to the Cause.

ad Bitcoin: I do not know of any complete enough definition of
the stack of data and functions and protocols that is Bitcoin so
that one might do a clean room implementation just from the


More information about the Gnupg-users mailing list