Re: Using GPG in embedded applications?

2009-03-26 Thread Nik N
easonable to assume he'd be able to pry the decryption (private) key and decrypt the data (flowing in at least one direction)? Nik N. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Remove public key from secret key

2008-06-23 Thread Nik N
Isn't this the case where symmetric encryption would be a perfectly adequate solution? NikNot ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users