On 27/08/2019 22:41, Peter Lebbing wrote:
> If a computer is compromised, this is game over for cryptography. Full
> stop.

This is not true. Many crypto systems are designed to perform damage
control and recovery in such cases.

If the compromise is game over for the user - it depends on threat profile.

Cheers,
Chris Narkiewicz

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to