Does this mean that my rootkey.gpg is vulnerable to attacks if it was created with an old GPG version following the loop-AES README instructions? If so then I should recreate it and overwrite the old one a few thousand times... mmh. Leo B. - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/