key-signing for pseudonyms

Chris Fox dissectingtable at
Sun May 16 22:51:40 CEST 2004

Atom 'Smasher' wrote:

> >If you don't have a copy, you should get one, and the discussion you'd
> >find most useful is in chapter 22.
> >
> =========================
> ah, yes... secure key exchange algorithms....
> of course, i guess one secure way to do it is a DH key exchange over
> email, and then the result can be verified in person... or are you
> suggesting something that doesn't require a calculator?
> i'll re-read through it tonight. are there any particular parts in
> particular that apply to our thread? the problem remains a social problem,
> not a computer problem.

Gotcha.  Well, as long as it's only a case of simple personal 
authentication  and not the evasion of a major government's dedicated 
intrusion attempts, I'd say do the confirmation over the telephone.  You 
can do PK key exchange through public channels and verify authenticity 
with a phone call.  It's not like ordinary individuals have networks of 
spies and spoofing servers at hand. 

>     "[The] feminist agenda is not about equal rights for women.
>      It is about a socialist, anti-family political movement that
>      encourages women to leave their husbands, kill their
>      children, practice witchcraft, destroy capitalism and become
>      lesbians."
>                -- Rev. Pat Robertson, 1992

And this guy still has an audience!
Gnupg-users mailing list
Gnupg-users at

More information about the Gnupg-users mailing list