> From: Sid Shetye [mailto:sid...@outlook.com] > Sent: Friday, August 29, 2014 12:01 PM > > It's more straightforward to attack that your scenario: > > I have your public key, so I have some idea. I send you a GPG email, your > email client will decrypt as it hits your inbox. Everything except the > "physical > touch" can be automated.
Yes, that's exactly what I said. See below: Only difference is, I said "S/MIME", and you said "GPG", both having the same effect in this context. > From: Edward Ned Harvey (bouncycastle) > Yes this is relevant in situations where some > automated system will repeatedly try to decrypt garbage data without the > need for human interaction. It might have some real world applications such > as attacking a server, or even perhaps a laptop with email client using > S/MIME key.