Naeem,
It's highly unlikely that an individual would be capable of stealing a secret 
key and using it to decrypt messages.  A large corporation or government, 
maybe.  Make your passphrases complex.
I'm a little cautious myself with my secret keys, so I use two hardware based 
approaches to ease my paranoia:
1.  I use an openpgp card to keep my normal signing and encryption subkeys 
secure.
2.  I keep my main secret key on a usb flash drive, along with backups of my 
secret subkeys, and public keys.
These are useful resources for further reading:
http://www.gnupg.org/howtos/card-howto/en/smartcard-howto.html
http://fortytwo.ch/gpg/subkeys
Best regards,
Harvey


----- Original Message ----
> From: "Afzal, Naeem M" <[EMAIL PROTECTED]>
> To: "gnupg-users@gnupg.org" <gnupg-users@gnupg.org>
> Sent: Thursday, July 3, 2008 1:36:48 PM
> Subject: how to get private key
> 
> Hi
> 
> I have general question regarding private key security.
> If a user creates its private public key pair by using some passphrase on a 
> system. Can this pair be taken to a different system and decrypt files that 
> were 
> generated using its public key? My guess is no, but needed to confirm with 
> you 
> guys. If it is possible, then how it will be done, any command to list 
> private 
> key etc. Also how can we protect where no one can steel this private key from 
> a 
> system other than restricting users access to the system?
> 
> Thanks
> naeem
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to