Atom Smasher wrote:

>btw, what's the threat model where this is advantageous?

I can imagine it might be used for plausible deniability: if some law
enforcement agency would force you to decrypt the messsage, you could
claim you can't and you didn't read it anyway because it's corrupted.

Of course, this might be automated in a hacked copy of gpg instead of
hand-editing a file. Also safer since it leaves no intermediate evidence
around on your harddisk. Of course it would be better to store the changed
source code somewhere safe.

Might work against police drones, employers, etc. The NSA is unlikely
to be fooled by such a scheme.

-- 
ir. J.C.A. Wevers         //  Physics and science fiction site:
[EMAIL PROTECTED]   //  http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to