Atom Smasher wrote: >btw, what's the threat model where this is advantageous?
I can imagine it might be used for plausible deniability: if some law enforcement agency would force you to decrypt the messsage, you could claim you can't and you didn't read it anyway because it's corrupted. Of course, this might be automated in a hacked copy of gpg instead of hand-editing a file. Also safer since it leaves no intermediate evidence around on your harddisk. Of course it would be better to store the changed source code somewhere safe. Might work against police drones, employers, etc. The NSA is unlikely to be fooled by such a scheme. -- ir. J.C.A. Wevers // Physics and science fiction site: [EMAIL PROTECTED] // http://www.xs4all.nl/~johanw/index.html PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users