next up previous contents
Next: References Up: Cryptography HowTo Previous: Using PGP With Elm   Contents


Some Final Warnings

First: Let us warn you by saying that we are neither cryptography experts, nor lawyers. However, we are communicating this knowledge to you as people who researched the subject as best they can from both the mathematical standpoint, and the legal standpoint. Please be careful with all of this information. Even though we do try to be accurate, we can't guarantee that we are.

Second: Whatever you do, don't use your private keys on a system that you don't have direct physical control over. You have no way of guessing what could happen, or who could gain control over your private keys and impersonate you.

Third: If at all possible, make certain that your computer is disconnected from any networks when using your private keys. Also, keep your private keys on diskette only, and only leave that diskette in the drive when using your private keys. This helps to improve your security incredibly.


Greg Wooledge 2000-10-11