In message <e78b92d1-0609-4080-af7b-fbf81889c...@sumptuouscapital.com>,
Kristian fiskerstrand <kristian.fiskerstr...@sumptuouscapital.com> wrote:

>>>...
>>> - From where do I take the key?
>>
>> The key will be embedded in the compiled binary of the program I'm building.
>
>This would be easily extracted and only offer limited protection

As stated in my other replies:  Yes, I know.


P.S.  Whereas at the outset of this thread, with all due and proper
modesty, I disclaimed deep knowledge of most things crypto, I am not
entirely unfamiliar with the tools, including gdb, that are available
for dissecting compiled code.  Indeed, once upon a time I worked on
such tools professionally.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to