Quote from: tina on October 26, 2012, 03:29 pmHi. people have been sending messages to my key for awhile now. i have been able to decrypt thwm just fine. just the other day, i had to go on a business trip and only had a different computer available to me. I downloaded the software, but I couldn't figure out how to decrypt messages for the life of me.when i got back to my home office, i was able to decrypt them with zero problems.At the risk of being blunt, reading your message raised the hairs on the back of my neck, as it betrays a stunning ignorance of how PGP/GPG works. Having the software alone by itself is insufficient to be able to decrypt anything. If that were not the case, then LE could merely download the software and decrypt anything they wished to on any systems they seized. In order to be able to encrypt/decrypt you need your public and private keyrings. to be installed on your other computer. That said, I would advise you, in the strongest possible terms, NOT to place PGP/GPG on it, and ESPECIALLY NOT to put your public and private keyrings on there. This only goes double if you travel internationally. Customs personnel can, and have, cloned traveler's hard drives -- if a Customs and Border Protection (CBP) agent were to do this, then they would have copies of your private keyring, and copies of all your email. It would then only be a matter of attempting to brute-force crack your PGP passphrase. Commercial software already exists to carry out this task. Unless you have taken extreme care, this is usually much easier than many people think. Furthermore, unless you are careful to prune your customers' keys from your public keyring, the authorities would have a list of people/identities you have been communicating with. I simply cannot stress enough just how dangerous this is.