gpgAnon, draft 20150

Stefan Claas sac at
Fri May 29 18:51:00 CEST 2020

LisToFacTor via Gnupg-users wrote:
> The setup described in this "how-to" was originally put together
> and used (and possibly still is) quite a while ago, using
> Disastry's  PGP 2.6.3ia-multi06 as the crypto back end.
> This guide has been composed from bits and pieces of the original
> user documentation, scissoring out the content that it refers to
> vaguely as "group policies". Other than that, the only substantial
> change is the replacement of pgp 2.6.3ia-multi06 with gpg 1.4.10
> (or later).
> Technical testing of the described setup with the new crypto back
> end is underway.
> Any comments and criticism, of whatever kind, is welcome, if it
> implies the permission to incorporate it into the final version
> of the document.
> Available to first one hundred downloads at:


how does Alice protects her Live-CD and USB stick, when she leaves home
and Mallory gains access to them, so that for example the Live-CD can
be exchanged?

Does Alice use the USB-stick also with other mediums and if so how does
she detect bad USB?



my 'hidden' service gopherhole:

More information about the Gnupg-users mailing list