hashed user IDs [was: Re: Security of the gpg private keyring?]

Hauke Laging mailinglisten at hauke-laging.de
Thu Mar 10 10:57:46 CET 2011

Am Donnerstag 10 März 2011 04:42:25 schrieb Ben McGinnes:

> Which brings us back to creating a pseudonym, using Tor (or other
> anonymising services), getting a disposable mail drop (or using
> alt.anonymous.messages) and going from there.  At the bare minimum.

A little practical advantage: If gpg had such a feature then the documentation 
may mention everything that is needed additionally (depending on the targetet 
opponent: spammers, facebook-alikes, secret police) or useful. Then people in 
a bad situation (which are probably no security experts) had a trustworthy 
source of information for planning their communication strategy.

PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 555 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20110310/e7793b8c/attachment.pgp>

More information about the Gnupg-users mailing list