cdr wrote:
[EMAIL PROTECTED] wrote:
> ...things missing from true-crypt:
...authentication with a key,

I am not sure of the context of this statement. To what are you referring?

Identification, and the subsequent authentication is already performed at the system(operating system) level.

Is there a specific application-level(?) authentication mechanism that you are aware of? If so, how does this abstraction interface with the filesystem -- which is at a considerably lower level than general user-space applications?

Thomas

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to