Are there refernces where such procedures are detailed that I might look at?
--- On Fri, 3/19/10, Robert J. Hansen <[email protected]> wrote: From: Robert J. Hansen <[email protected]> Subject: Re: Secure unattended decryption To: [email protected] Date: Friday, March 19, 2010, 5:30 PM On 3/19/2010 4:26 PM, [email protected] wrote: > Yes, well, changing the AES key on a database (Which may be several > hundred gigabytes) is time consuming. Only if you design your database poorly. This is a solved problem in both database design and filesystem design. -----Inline Attachment Follows----- _______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
_______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
