encrypting to expired certificates

Nicholas Cole nicholas.cole at gmail.com
Tue Sep 16 17:01:27 CEST 2014


On Tuesday, 16 September 2014, Peter Pentchev <roam at ringlet.net> wrote:

> On Tue, Sep 16, 2014 at 03:04:08PM +0100, Nicholas Cole wrote:
> > Can anyone explain to me why one would want to continue using a key
> > and yet not simply change the expiry date?  I really find all of the
> > examples being given to be incredibly contrived.
>
> Uhm, are you sure that you really mean to say "incredibly contrived" as
> in "you guys must have tried your imagination really hard to come up
> with these examples, none of which will happen in the real world", or do
> you really mean "highly unlikely except in isolated use cases"?  Because
> what people are showing you are real use cases, ones that have happened
> with real people in the real world.  "Unlikely" and "isolated", yes, but
> I wouldn't use "contrived" in this case.
>

I apologise for my poor choice of language.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20140916/16fe53a7/attachment.html>


More information about the Gnupg-users mailing list