Someone has harvested my address

Robert J. Hansen rjh at sixdemonbag.org
Tue Sep 9 23:32:08 CEST 2008


David Shaw wrote:
>> The conversation we're not having, which I think we should be
>> having, is "how can we have trusted communications on a hostile
>> network when we don't know if we really control our own PCs?"
> 
> You can't, of course, so it would be a short conversation :)

Well, yes, but that's kind of not really what I was aiming to start.  :)

When confronted with the fact many PCs (typically Win32, but there's no
reason to think exclusively so) are compromised without us knowing it,
what then should our response to it be in terms of effective usage of GnuPG?

(My answer is 'use OS X and/or Linux, and always suspect the endpoints
are leaky'.  Other people's may differ, of course.)



More information about the Gnupg-users mailing list