Improve company productivity with a Business Account.Sign Up
Your question, your audience. Choose who sees your identity—and your question—with question security.
I see their point, however the PC will probably have copies of the public/private key on it so regardless of an automated process, if their machine is compromised the hacker will have access to everything they need!
All very true, but the OP has already stated he is using the PGP standard.
gpg --symmetric --cipher-algo aes256 -o test.gpg test.txt
sdelete -p 7 test.txt
Open in new window
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
Please enter a first name
Please enter a last name
Must be at least 4 characters long.
Join and Comment
Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.
One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.