On Fri, Sep 20, 2013 at 01:44:32PM +0200, Werner Koch wrote: > On Thu, 19 Sep 2013 20:59, jo...@netpage.dk said: > > Yes, but it isn't only HIS stuff! > You have to trust the recipient anyway that he keep the information > confidential. It does not help to use string encryption if the message > is later re-tweeted by the recipient. Unfortunately this is too often > the case: For example, you snail confidential information and the > recipient in turn scans them and passed them on using plain email.
If Alice does not trust the NIST curves, and Bob insists on using them, this is a reason for Alice not to trust Bob because (in her eyes) his security practice is lax. Bob does not (in Alice's view) take sufficient care to keep Alice's words confidential. It is reasonable for her then not to exchange confidences with Bob in this channel. A: Can you keep a secret? B: No. A: Then I won't tell you any. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Machines should not be friendly. Machines should be obedient.
signature.asc
Description: Digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users