On 27/08/2019 22:41, Peter Lebbing wrote: > If a computer is compromised, this is game over for cryptography. Full > stop.
This is not true. Many crypto systems are designed to perform damage control and recovery in such cases. If the compromise is game over for the user - it depends on threat profile. Cheers, Chris Narkiewicz _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users