On 25.07.2012, Faramir wrote: > Clearly I'm out of my league there. I had heard about that, but > later I also heard about stacking different algos (with different > keys > of course) to increase security.
What's the model of threat in your case, actually? Usually, the crypto algorithm isn't the weakest part in the whole scenario, and stacking different algorithms will therefore not make any sense at all. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users