l human element into the problem
is certainly interesting. If one can torture a passphrase or key out of
someone, what is to stop them from extracting the encrypted data from
the person as well? After all, in the situations you hint at, it is
this which is actually relevant to the torturin
d certainly render the problem of
recovering any encrypted communication far less tractable.
pants.
pgpWDYQOYTxje.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
adduid and deluid commands, respectively.
pants.
pgp0DUoIWdDDl.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users