how vulnerable is "hidden-encrypt-to"
Hauke Laging
mailinglisten at hauke-laging.de
Fri Aug 17 17:16:27 CEST 2012
Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
> Is there any way on heaven or earth for someone to discover from a
> message, one sent to them or to another person, whether the encrypted
> message had been made with an option "hidden-encrypt-to"
Sure.
start cmd:> LC_ALL=C gpg --list-packets test.gpg
:pubkey enc packet: version 3, algo 1, keyid 8E75E2184AD27C5B
data: [4095 bits]
:pubkey enc packet: version 3, algo 1, keyid 0000000000000000
data: [2046 bits]
gpg: anonymous recipient; trying secret key 0x25D4FD8B ...
> or what key ID
> had been used in conjunction with that option? Thanks.
You need the private recipient key in order to find out that key ID. It's the
use of this option that you cannot get this information in another way.
Hauke
--
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 555 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20120817/c77f2c28/attachment.pgp>
More information about the Gnupg-users
mailing list