On Wed, Jul 12, 2006 at 10:59:52AM -0600, Benny Helms wrote: > On Wed, 2006-07-12 at 12:25 +0200, Janusz A. Urbanowicz wrote: > > On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote: > <snip> > > What is your actual threat model here? > > > > The simplest answer is to check gpg's rc after the encryption run. > > Before deleting original file, I must make certain encrypted version is > in good shape so I can open it at a later date and obtain data. If it > is broken, I'm in deep monkey muffins. That's the threat model.
If I read this thread right you actually wnt to make a decryption and compare the results and you do _not_ want to keep the private key on that machine. Could you do something creative with --show-session-key to be able to decrypt each file once w.o. risking your private key? HTH //Samuel _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users