howto secure older keys after the recent attacks
    David Shaw 
    dshaw at jabberwocky.com
       
    Fri Sep 11 04:52:39 CEST 2009
    
    
  
On Sep 10, 2009, at 5:44 PM, Philippe Cerfon wrote:
> On Thu, Sep 10, 2009 at 10:21 PM, Robert J. Hansen <rjh at sixdemonbag.org 
> > wrote:
>> I understood him to mean the "key ID" as the fingerprint of the
>> certificate's primary signing key, rather than checking each bit of  
>> the
>> certificate's primary signing key individually.
>
> I meant the fingerprint, yes.
> But now that you say it. Would it be "better" to not just check other
> keys via their fingerprint, but to really copy them (e.g. per
> USB-stick) from their owners and sign only such direct copies?
I suspect you are more in danger of being hit by meteors several times  
in a row as you walk to your friend's house with the USB stick, than  
you are in danger from SHA-1.
:)
David
    
    
More information about the Gnupg-users
mailing list