Secure unattended decryption

FederalHill federalhillrent at yahoo.com
Fri Mar 19 22:36:53 CET 2010


Are there refernces where such procedures are detailed that I might look at?


 

--- On Fri, 3/19/10, Robert J. Hansen <rjh at sixdemonbag.org> wrote:


From: Robert J. Hansen <rjh at sixdemonbag.org>
Subject: Re: Secure unattended decryption
To: gnupg-users at gnupg.org
Date: Friday, March 19, 2010, 5:30 PM


On 3/19/2010 4:26 PM, eggled at gmail.com wrote:
> Yes, well, changing the AES key on a database (Which may be several
> hundred gigabytes) is time consuming.

Only if you design your database poorly.  This is a solved problem in
both database design and filesystem design.


-----Inline Attachment Follows-----


_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users



      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20100319/cc14dc17/attachment.htm>


More information about the Gnupg-users mailing list