Talking about Cryptodevices... which one?

Dave Chapeskie gnupg2 at
Fri Feb 6 22:59:02 CET 2015

On Fri, Feb 06, 2015 at 03:06:04PM +0100, Matthias-Christian Ott wrote:
> On 2015-02-06 09:12, Andreas Schwier wrote:
> If you use Schneier's attack tree for PGP encryption [1] as the threat
> model (for the lack of something better)

> [1]

For those interested, I think better links would be to an article
Schneier wrote and the PGP figure rather than to a PDF of slides:

Dave Chapeskie

More information about the Gnupg-users mailing list