Hey, that sounds like a key distribution problem!
It is, quite literally. The scheme can be thought of as a message authentication code (MAC), with a shared key that has to be negotiated ahead of time; and just like with a MAC, anyone who has the secret key is capable of forging the message.
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users