how vulnerable is "hidden-encrypt-to"

vedaal at vedaal at
Mon Aug 20 15:58:00 CEST 2012

On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger 
<cloudpg at> wrote:

> if a message M is encrypted to you and other
>recipients using RSA, then you are of course able to obtain the
>session key K.  Now, if you suspect Alice to be a recipient then 
>you download her public key from a key server and encrypt the 
>key K under her public key.  If the result matches one of the
>encrypted session keys contained in M, then Alice is a recipient 
>of M.


The one sending the message really is in control here ;-)
The sender can use hidden encrypt to ANY public key.

i.e. if Alice is sending the message and wants to hide her 
nothing prevents her from using throw-keyid with Bob's public key 
instead of her own, or NIST's, or PGP Corporation's, or any onyone 

If the message is unsigned, the receiver cannot tell,
(assuming it's sent from an appropriately anonymized e-mail 
and if it is signed, then the throw -keyid doesn't hide the 
sender's identity from the receiver.


(sorry about thread-breaking ;-((
sent from a site that doesn't allow e-mail clients)

More information about the Gnupg-users mailing list