Why do we use a different key to sign than to encrypt

2011-03-01 Thread Guy Halford-Thompson
Not GPG specific, but I was wondering if someone could point me in the direction of some resources that explain why we use different keys to sign and encrypt (for cases where the same key _could_ do both e.g. RSA). I cant seem to pick anything up on google. Thanks -- Guy Halford-Thompson

Re: Why do we use a different key to sign than to encrypt

2011-03-01 Thread Guy Halford-Thompson
Thanks for the list of resources G On 1 March 2011 14:41, Jeffrey Walton noloa...@gmail.com wrote: On Tue, Mar 1, 2011 at 8:13 AM, Guy Halford-Thompson g...@cach.me wrote: Not GPG specific, but I was wondering if someone could point me in the direction of some resources that explain why we

Security of the gpg private keyring?

2011-02-28 Thread Guy Halford-Thompson
-hackers cracking the keys here here... just things like metadata associated with the keys... email addresses, who has signed them, expiry date etc... Ty -- Guy Halford-Thompson - http://www.cach.me/blog ___ Gnupg-users mailing list Gnupg-users@gnupg.org

Re: Security of the gpg private keyring?

2011-02-28 Thread Guy Halford-Thompson
Thanks for the help, didnt really occur to me how much info is available in the public keyring, guess you cant do much about it tho. -- Guy Halford-Thompson - http://www.cach.me/blog ___ Gnupg-users mailing list Gnupg-users@gnupg.org http