Hi 2 separate questions: 1. I've read that you are not supposed to use the same gpg key on different loop-aes volumes. Why? Even if the volumes contains some (but not all) data in common, how does that help an attacker? 2. How long in bytes does a known plaintext string encrypted at a known position on a v3.x loop-aes encrypted device have to be to allow an attacker to reverse engineer what the v3.x plaintext multiline key must be? Thanks - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/