Re: Question about the following....

2013-02-24 Thread Jay Sulzberger




On Sat, 23 Feb 2013, Mark Campo  wrote:


Assume I had the GnuPG/PGP software.yet tell me how you would use GnuPG/PGP
to encrypt the file and what instructions or methods you would need me to
use to get the encrypted file and decrypt it on the recipients machine
WITHOUT the recipient having GnuPG/PGP software loaded to the recipient
system ... STEP BY STEP Instructions


Here is one answer:

1. Ship a device to your recipient, which has aboard the software
and your recipient's private key.  Here I make the assumption that
you have your recipient's public key and used it to send them an
encrypted message.

and here is another answer to a perhaps different question

2. Find out exactly what the formats are and what the
computations are, and then do them by hand.  Give your recipient
the formal definitions, and let your recipient write the needed
code.

Both versions of your question are good, and thorough answers
would be of use to the Cause.

ad Bitcoin: I do not know of any complete enough definition of
the stack of data and functions and protocols that is Bitcoin so
that one might do a clean room implementation just from the
definition.

oo--JS.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Question about the following....

2013-02-24 Thread Mark Campo
Assume I had the GnuPG/PGP software.yet tell me how you would use GnuPG/PGP
to encrypt the file and what instructions or methods you would need me to
use to get the encrypted file and decrypt it on the recipients machine
WITHOUT the recipient having GnuPG/PGP software loaded to the recipient
system ... STEP BY STEP Instructions

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users