Sven Radde wrote:
> Imagine the session-key part of an OpenPGP message be destroyed.
> Commonly, this will be far less than 1% of the actual data, but even
> with 99% intact, you won't have a chance of recovering *anything* from it.

Err.  What?

With a 256-bit cipher, if you're missing 3 bits, there are only eight
possible keys.  This is not an obstacle.

> With a single images.zip.gpg file, a bit flip may mean that the whole
> archive is unreadable (which is the worst case... no idea what an
> average case might look like).

The moral of the story is not to avoid encrypting your backups, but to
keep multiple copies of your backed-up data.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to