key generation: paranoia mode - explicit random input

MFPA 2014-667rhzu3dc-lists-groups at riseup.net
Wed Feb 26 22:01:40 CET 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
NotDashEscaped: You need GnuPG to verify this message

Hi


On Wednesday 26 February 2014 at 5:33:55 AM, in
<mid:3046785.38M7boRugT at inno>, Hauke Laging wrote:


> Whether the
> non-compromised key is generated by a compromised GnuPG
> is a different question and does not affect the
> security of the key itself!

And if the compromised GnuPG then leaks the private key and the
passphrase?


--
Best regards

MFPA                    mailto:2014-667rhzu3dc-lists-groups at riseup.net

Life is a holiday. In the same way that glass is a liquid.
-----BEGIN PGP SIGNATURE-----

iPQEAQEKAF4FAlMOVj1XFIAAAAAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5p0ZgEAI5nqpKNYFFsRtBbbPWSYSJdhmKfBEeJd98G
H05SivKZBpJ7S0G7Fx0iFPV/k4CBstFlmVLjcqDlIgA1HqDl5rPENuOUdQAg1n6Q
ZoyXvoL2RhNEucdkyvO2X8LcFEeyATOAaSDOs+3Qh+AEnyo2vW8mUuDNHqyB8IYD
pwp3DQDY
=e3m3
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list