gpgAnon, draft 20150

Stefan Claas sac at 300baud.de
Fri May 29 18:51:00 CEST 2020


LisToFacTor via Gnupg-users wrote:
 
> The setup described in this "how-to" was originally put together
> and used (and possibly still is) quite a while ago, using
> Disastry's  PGP 2.6.3ia-multi06 as the crypto back end.
> 
> This guide has been composed from bits and pieces of the original
> user documentation, scissoring out the content that it refers to
> vaguely as "group policies". Other than that, the only substantial
> change is the replacement of pgp 2.6.3ia-multi06 with gpg 1.4.10
> (or later).
> 
> Technical testing of the described setup with the new crypto back
> end is underway.
> 
> Any comments and criticism, of whatever kind, is welcome, if it
> implies the permission to incorporate it into the final version
> of the document.
> 
> Available to first one hundred downloads at:
> https://send.firefox.com/download/d49d3f511202f943/#ITQHMkZexDePZ1JMwziuqg

Hi,

how does Alice protects her Live-CD and USB stick, when she leaves home
and Mallory gains access to them, so that for example the Live-CD can
be exchanged?

Does Alice use the USB-stick also with other mediums and if so how does
she detect bad USB?

<https://www.manageengine.com/data-security/security-threats/bad-usb.html>

Regards
Stefan

-- 
my 'hidden' service gopherhole:
gopher://iria2xobffovwr6h.onion



More information about the Gnupg-users mailing list