Daniel Kahn Gillmor: > but basically: if your adversary has root on your machine or has full > control over your local account even, there isn't a way to use gpg (or > any software) safely. This is unfortunate, but it seems to be the way > things work. :( This is the important point here imho! ~abel