David Shaw wrote:
>> The conversation we're not having, which I think we should be
>> having, is "how can we have trusted communications on a hostile
>> network when we don't know if we really control our own PCs?"
> 
> You can't, of course, so it would be a short conversation :)

Well, yes, but that's kind of not really what I was aiming to start.  :)

When confronted with the fact many PCs (typically Win32, but there's no
reason to think exclusively so) are compromised without us knowing it,
what then should our response to it be in terms of effective usage of GnuPG?

(My answer is 'use OS X and/or Linux, and always suspect the endpoints
are leaky'.  Other people's may differ, of course.)

_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to