Timeline for Decrypting a file encrypted on a different system
Current License: CC BY-SA 3.0
        4 events
    
    | when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Aug 7, 2013 at 4:13 | vote | accept | Kellvyn | ||
| Aug 6, 2013 at 16:53 | comment | added | Gilles 'SO- stop being evil' | For example: You have to match the key with the encrypted data. Where are you going to store your key? Or rather, most likely, your keys? How do you know which key is which? So you have some data lying around… which key is it encrypted with? With gpg, these questions are easy to answer. With the openssl utility, they aren't. Also, do you care about data integrity, or only confidentiality? (CBC doesn't provide integrity.) | |
| Aug 6, 2013 at 15:51 | comment | added | Kellvyn | "I don't recommend using it, it's too easy to make a mistake and either end up with non-recoverable data or insecure data." Can you elaborate on that? | |
| Aug 6, 2013 at 2:03 | history | answered | Gilles 'SO- stop being evil' | CC BY-SA 3.0 |