hashed user IDs [was: Re: Security of the gpg private keyring?]
Hauke Laging
mailinglisten at hauke-laging.de
Thu Mar 10 10:57:46 CET 2011
Am Donnerstag 10 März 2011 04:42:25 schrieb Ben McGinnes:
> Which brings us back to creating a pseudonym, using Tor (or other
> anonymising services), getting a disposable mail drop (or using
> alt.anonymous.messages) and going from there. At the bare minimum.
A little practical advantage: If gpg had such a feature then the documentation
may mention everything that is needed additionally (depending on the targetet
opponent: spammers, facebook-alikes, secret police) or useful. Then people in
a bad situation (which are probably no security experts) had a trustworthy
source of information for planning their communication strategy.
Hauke
--
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 555 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20110310/e7793b8c/attachment.pgp>
More information about the Gnupg-users
mailing list