Re: Using GPG in embedded applications?
easonable to assume he'd be able to pry the decryption (private) key and decrypt the data (flowing in at least one direction)? Nik N. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Remove public key from secret key
Isn't this the case where symmetric encryption would be a perfectly adequate solution? NikNot ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users