Revocation certificates [was: time delay unlock private key.]

Leo Gaspard ekleog at
Fri Jan 24 18:23:35 CET 2014

On Thu, Jan 23, 2014 at 04:38:19PM -0800, Robert J. Hansen wrote:
> >Well... I don't know how you type
> With a nine-volt battery, a paperclip, and a USB cable that has only one end
> -- the other is bare wires.  You wouldn't believe how difficult it is to do
> the initial handshake, but once you've got it down you can easily tap out
> oh, three or four words a minute.  For speed, nothing else comes close.
> My father gets on my case for using the nine-volt battery.  In his day, they
> had a potato and a couple of wire leads plunged into it.  But really,
> technology marches on and we should all embrace battery technology.

Great laugh!

(of course, I meant how fast)

> >passphrase would really have to try hard to guess what passphrase I am using.
> >And even more to remember a seven-word sentence seen once.
> You are not the typical use case.  No one person is a typical use case.

Well... You are right, of course. Yet this does not answer my second point: if
the spouse is spying on you to get your passphrase and remember it, then love is
already gone, and you are being subject to the usual hooker attack.

Yet I do see your point for revocation certificates here, I think.

Oh, just found another one in favor of revocation certificates: they can be
easily sent to keyservers from cybercafes without any special software

Thanks and cheers,


More information about the Gnupg-users mailing list