key generation: paranoia mode - explicit random input
Hauke Laging
mailinglisten at hauke-laging.de
Wed Feb 26 22:08:42 CET 2014
Am Mi 26.02.2014, 21:01:40 schrieb MFPA:
> And if the compromised GnuPG then leaks the private key and the
> passphrase?
How is it going to do that if (a) it's running on an offline system and
(b) its output is compared with that of other GnuPG "versions"?
Hauke
--
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20140226/ee0a0b5f/attachment.sig>
More information about the Gnupg-users
mailing list