On Sat, 23 Feb 2013, Mark Campo <mdca...@bellsouth.net> wrote:
Assume I had the GnuPG/PGP software.yet tell me how you would use GnuPG/PGP to encrypt the file and what instructions or methods you would need me to use to get the encrypted file and decrypt it on the recipients machine WITHOUT the recipient having GnuPG/PGP software loaded to the recipient system ... STEP BY STEP Instructions
Here is one answer: 1. Ship a device to your recipient, which has aboard the software and your recipient's private key. Here I make the assumption that you have your recipient's public key and used it to send them an encrypted message. and here is another answer to a perhaps different question 2. Find out exactly what the formats are and what the computations are, and then do them by hand. Give your recipient the formal definitions, and let your recipient write the needed code. Both versions of your question are good, and thorough answers would be of use to the Cause. ad Bitcoin: I do not know of any complete enough definition of the stack of data and functions and protocols that is Bitcoin so that one might do a clean room implementation just from the definition. oo--JS. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users