gpg 1.4
Robert J. Hansen
rjh at sixdemonbag.org
Tue Jan 13 12:06:25 CET 2026
> Is using gpg 1.4 on an "air-gaped" computer to generate RSA 4096 keys
> and encrypting files/messages to owners of such keys still considered
> safe?
No idea. We're not you. We don't know your threat model, what actors
you're facing, what environment you're in. GnuPG just provides tools.
Knowing what to do with it, how, and why, is on you.
Please don't mistake this for a sarcastic answer. It's an honest one.
There is no way Werner, or anyone, can answer your question without
first asking a lot of questions. That kind of individualized
consultation usually costs money.
I will say this: I'm unaware of any reason it would be considered
unsafe. Whether it would be considered safe is an open question.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20260113/11b93893/attachment-0001.sig>
More information about the Gnupg-users
mailing list