On 10/12/10 4:38 AM, Hauke Laging wrote:
> Am Donnerstag 09 Dezember 2010 18:18:00 schrieb Ben McGinnes:
> 
>> And you're basing that assessment on what?
>>
>> I know where all the physical media containing a copy of my secret
>> key(s) are and I control all the hardware that can access them.
> 
> And this hardware is always offline with no complex applications
> running? 

Effectively.  The server is always on, but my secret keyring is not
installed on the server.  The only active system with the secret
keyring is only running when I am in front of it.

> There are scenarios in which controlling the hardware is enough. But
> they are very rare. Probably somebody with such a scenario had said
> something different from "based on security".

Well, I suppose there's the threat of people kicking in the door, but
if that kind of situation were to become a possibility (again), my
concerns wouldn't pertain to my email and/or files, my concerns would
be more in the nature of defending life and limb.


Regards,
Ben

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to