Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>one-page guide to using GPG

GPG is infamous for being difficult to use correctly and for an antiquated design (IIRC forward secrecy is impossible?). And assuming E2EE backdoor actually exists, the gov is likely to be able to get at your key.

>Are the GPG devs going to backdoor GPG to satisfy governments?

No, but most users are unlikely to verify their GPG build is the right build.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: