On Fri, 5 Jun 2009, Robert J. Hansen wrote: . . .
Active MitM is pretty much the military incendiary bomb in the living room. A competent attacker who is controlling your network traffic and wishes to subvert your system has so many ways to do it that you stand effectively no chance of preventing it.
Well, you know, there may be a matter of attitude involved here. The worm who keeps twitching and twisting is the one who escapes the bird's beak, not the worm who just goes limp. Being more advanced than worms, it's up to us humans to figure how to escape the harms of our more advanced varieties of attacks, and posting to gnupg-users asking for usable suggestions is part of what to do, just like trying to get as close as possible to in-person to exchange public keys, using SHA checksums and checking for replicated verification despite multiple sourcing, hiring experts as appropriate to get gradations of opinions but doing one's own thinking and making one's own decisions, and so on. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users