On Fri, Sep 20, 2013 at 01:44:32PM +0200, Werner Koch wrote:
> On Thu, 19 Sep 2013 20:59, jo...@netpage.dk said:
> > Yes, but it isn't only HIS stuff!
> You have to trust the recipient anyway that he keep the information
> confidential.  It does not help to use string encryption if the message
> is later re-tweeted by the recipient.  Unfortunately this is too often
> the case: For example, you snail confidential information and the
> recipient in turn scans them and passed them on using plain email.

If Alice does not trust the NIST curves, and Bob insists on using
them, this is a reason for Alice not to trust Bob because (in her
eyes) his security practice is lax.  Bob does not (in Alice's view)
take sufficient care to keep Alice's words confidential.  It is
reasonable for her then not to exchange confidences with Bob in this
channel.

A:  Can you keep a secret?
B:  No.
A:  Then I won't tell you any.

-- 
Mark H. Wood, Lead System Programmer   mw...@iupui.edu
Machines should not be friendly.  Machines should be obedient.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to