Libcrypt examples?

Peter Lebbing peter at
Thu Oct 16 19:52:35 CEST 2014

On 15/10/14 23:45, Ronald F. Guilmette wrote:
> There *are* simply solutions to this rather trivial and common 
> problem.

I don't consider that a trivial problem, actually. I can think of
many threat models where it is entirely non-trivial. You never mentioned
a threat model.

> OK.  Swell.  Ignoring, for the moment, the personal condescension 
> implicit in your comments

There was no condescension in there; none at all whatsoever. I don't
consider myself knowledgeable enough to write such an implementation.
And I'm not condescending towards myself.

I'm sorry that you felt it that way; if I had ever considered that you
might find it condescending I would have included a disclaimer. However,
I thought the following two quotes together already made it clear that
it was no condescension.

>From the release announcement:

> Thorough understanding of applied cryptography is required for proper
> use Libgcrypt.

>From your own words:

> [...] even though I am by no means knowledgable about cryptography 
> generally.  (Most of what little I do know has been garnered from 
> with Wikipedia.)

> Was that promise just inserted into the manual as some sort of cruel
>  joke, you know, to get naive people like me to waste a lot of time 
> looking for examples that aren't even actually in there?

<Sigh>. If this is how you wish this conversation to go, I don't feel
like helping. When we start out assuming bad faith on everything that in
some completely unlikely scenario could possibly be bad faith, then I am
done with this.

You have my apologies for writing something you misread as
condescending. Other than that, I'm done here.

Good luck,


I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <>

More information about the Gnupg-users mailing list