gpgAnon, draft 20150
Stefan Claas
sac at 300baud.de
Fri May 29 18:51:00 CEST 2020
LisToFacTor via Gnupg-users wrote:
> The setup described in this "how-to" was originally put together
> and used (and possibly still is) quite a while ago, using
> Disastry's PGP 2.6.3ia-multi06 as the crypto back end.
>
> This guide has been composed from bits and pieces of the original
> user documentation, scissoring out the content that it refers to
> vaguely as "group policies". Other than that, the only substantial
> change is the replacement of pgp 2.6.3ia-multi06 with gpg 1.4.10
> (or later).
>
> Technical testing of the described setup with the new crypto back
> end is underway.
>
> Any comments and criticism, of whatever kind, is welcome, if it
> implies the permission to incorporate it into the final version
> of the document.
>
> Available to first one hundred downloads at:
> https://send.firefox.com/download/d49d3f511202f943/#ITQHMkZexDePZ1JMwziuqg
Hi,
how does Alice protects her Live-CD and USB stick, when she leaves home
and Mallory gains access to them, so that for example the Live-CD can
be exchanged?
Does Alice use the USB-stick also with other mediums and if so how does
she detect bad USB?
<https://www.manageengine.com/data-security/security-threats/bad-usb.html>
Regards
Stefan
--
my 'hidden' service gopherhole:
gopher://iria2xobffovwr6h.onion
More information about the Gnupg-users
mailing list