>>>>> Harry Henry Gebel writes: hhg> The mode is NOT seen as security enough. The private key is hhg> encrypted using a symmetrical cipher whose key is derived hhg> from a hash of the passphrase. (the exact cipher and hash can hhg> be specified in an S2K block in the secret keyring) In other hhg> words, if you selected a very good passphrase (this is a BIG hhg> if for most people) if is just as well encrypted as any gpg hhg> encrypted message message. The reason people must not be hhg> allowed to read it is that it gives attackers a single key to hhg> discover that can then be used to recover ALL of the hhg> (symmetrical) keys used to encrypt messages with that key, hhg> (and because most people choose poor passwords discovering hhg> that one key would not be hard for most people's keyrings. I hhg> am not sure what doing 'less' on the keyring is supposed to hhg> indicate?
Oh. I guess I should start thinking about what I write before I write it. In my defense, I didn't find anything to contradict what I wrote in the gpg man page, but I suppose that I didn't read enough. Consider me humbled. Thanks for the correction, Chris -- Every child in America MUST get one of these things for Christmas or Chanukah or Kwanzaa or Atheist Children Get Presents Day. -- Dave Barry