Where is ECC in gpg2 (specifically gnupg-2.0.21

Mark H. Wood mwood at IUPUI.Edu
Fri Sep 20 15:17:50 CEST 2013

On Fri, Sep 20, 2013 at 01:44:32PM +0200, Werner Koch wrote:
> On Thu, 19 Sep 2013 20:59, josef at netpage.dk said:
> > Yes, but it isn't only HIS stuff!
> You have to trust the recipient anyway that he keep the information
> confidential.  It does not help to use string encryption if the message
> is later re-tweeted by the recipient.  Unfortunately this is too often
> the case: For example, you snail confidential information and the
> recipient in turn scans them and passed them on using plain email.

If Alice does not trust the NIST curves, and Bob insists on using
them, this is a reason for Alice not to trust Bob because (in her
eyes) his security practice is lax.  Bob does not (in Alice's view)
take sufficient care to keep Alice's words confidential.  It is
reasonable for her then not to exchange confidences with Bob in this

A:  Can you keep a secret?
B:  No.
A:  Then I won't tell you any.

Mark H. Wood, Lead System Programmer   mwood at IUPUI.Edu
Machines should not be friendly.  Machines should be obedient.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: </pipermail/attachments/20130920/ee32898b/attachment.sig>

More information about the Gnupg-users mailing list