Not GPG specific, but I was wondering if someone could point me in the
direction of some resources that explain why we use different keys to
sign and encrypt (for cases where the same key _could_ do both e.g.
RSA). I cant seem to pick anything up on google.
Thanks
--
Guy Halford-Thompson
Thanks for the list of resources
G
On 1 March 2011 14:41, Jeffrey Walton noloa...@gmail.com wrote:
On Tue, Mar 1, 2011 at 8:13 AM, Guy Halford-Thompson g...@cach.me wrote:
Not GPG specific, but I was wondering if someone could point me in the
direction of some resources that explain why we
-hackers cracking the keys here here...
just things like metadata associated with the keys... email addresses,
who has signed them, expiry date etc...
Ty
--
Guy Halford-Thompson - http://www.cach.me/blog
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Thanks for the help, didnt really occur to me how much info is
available in the public keyring, guess you cant do much about it tho.
--
Guy Halford-Thompson - http://www.cach.me/blog
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http