In message <e78b92d1-0609-4080-af7b-fbf81889c...@sumptuouscapital.com>, Kristian fiskerstrand <kristian.fiskerstr...@sumptuouscapital.com> wrote:
>>>... >>> - From where do I take the key? >> >> The key will be embedded in the compiled binary of the program I'm building. > >This would be easily extracted and only offer limited protection As stated in my other replies: Yes, I know. P.S. Whereas at the outset of this thread, with all due and proper modesty, I disclaimed deep knowledge of most things crypto, I am not entirely unfamiliar with the tools, including gdb, that are available for dissecting compiled code. Indeed, once upon a time I worked on such tools professionally. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users