In message <[email protected]>,
Kristian fiskerstrand <[email protected]> wrote:

>>>...
>>> - From where do I take the key?
>>
>> The key will be embedded in the compiled binary of the program I'm building.
>
>This would be easily extracted and only offer limited protection

As stated in my other replies:  Yes, I know.


P.S.  Whereas at the outset of this thread, with all due and proper
modesty, I disclaimed deep knowledge of most things crypto, I am not
entirely unfamiliar with the tools, including gdb, that are available
for dissecting compiled code.  Indeed, once upon a time I worked on
such tools professionally.

_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to