> From: Sid Shetye [mailto:sid...@outlook.com]
> Sent: Friday, August 29, 2014 12:01 PM
> 
> It's more straightforward to attack that your scenario:
> 
> I have your public key, so I have some idea. I send you a GPG email, your
> email client will decrypt as it hits your inbox. Everything except the 
> "physical
> touch" can be automated.

Yes, that's exactly what I said.  See below:  Only difference is, I said 
"S/MIME", and you said "GPG", both having the same effect in this context.

> From: Edward Ned Harvey (bouncycastle)
> Yes this is relevant in situations where some
> automated system will repeatedly try to decrypt garbage data without the
> need for human interaction.  It might have some real world applications such
> as attacking a server, or even perhaps a laptop with email client using
> S/MIME key.

Reply via email to