> If Mallory would get somehow access to my Computer and replace one > pub key from my communication partners with a fake one and sets the > trust level to Ultimate. How can i detect this, if i'm not always > looking at the complete Fingerprint and compare it with a separate > list?
If Mallory can tamper with your keyrings, that's a total game-over condition. At that point there are dozens of attacks open to her. Once you lose control of your computer, it's all over. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users