hashed user IDs [was: Re: Security of the gpg private keyring?]

Robert J. Hansen rjh at sixdemonbag.org
Sun Mar 13 06:43:32 CET 2011

On 3/12/2011 7:41 PM, Hauke Laging wrote:
> No. You just control who can make the next step: Mapping keys to UIDs.

Yes.  Like I said, you want an ORCON system.  If you control how people
can use data, then you've entered ORCON.

As soon as you invent an ORCON system, I would love to revisit this
conversation.  I am not being in the slightest bit facetious: I think
ORCON systems are difficult theoretical and practical challenges and I'd
love to see a successful system fielded.

It's just that, as currently drafted, this isn't it.

More information about the Gnupg-users mailing list