On 25.07.2012, Faramir wrote:

>   Clearly I'm out of my league there. I had heard about that, but
> later I also heard about stacking different algos (with different
> keys
> of course) to increase security.

What's the model of threat in your case, actually? Usually, the crypto
algorithm isn't the weakest part in the whole scenario, and stacking
different algorithms will therefore not make any sense at all.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to