key generation: paranoia mode - explicit random input

Hauke Laging mailinglisten at hauke-laging.de
Wed Feb 26 22:08:42 CET 2014


Am Mi 26.02.2014, 21:01:40 schrieb MFPA:

> And if the compromised GnuPG then leaks the private key and the
> passphrase?

How is it going to do that if (a) it's running on an offline system and 
(b) its output is compared with that of other GnuPG "versions"?


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20140226/ee0a0b5f/attachment.sig>


More information about the Gnupg-users mailing list