-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
You will have to just trust GPG as I do not think that such checking
is possible to do in a secure manner.
At my org, I am using GPG to encrypt all backups. To ensure that the
code does not contain bugs, I wait for ~ a month before upgrading the
GPG release. After an upgrade, I perform several
backup+encrypt+decrypt+restore+check to make sure nothing is borked. I
lock in the version and use that for a while. I do not worry about
daily backups, but each quarterly backup, I encrypt it, decrypt it and
verify it manually.
The user base of GnuPG is huge, and any serious bugs in the code will
be weeded out very quickly by the beta testers and early adopters.
Invalid encryptions is a VERY serious bug.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFEtuXrNR4PQ6HVpW0RAkGuAKDflrwOXTRc521Mhj0StDSriiaDdgCg1JMD
kkmh4QPGGJ45njeUsC4Cry8=
=R6vH
-----END PGP SIGNATURE-----



_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to