Why ¨trouble¨ ?

pants pants at cs.hmc.edu
Tue Aug 28 03:29:29 CEST 2012

On Tue, Aug 28, 2012 at 03:05:58AM +0200, No such Client wrote:
> and putting your key on a keyserver.. No thanks..

If you're against publishing your public key on a key server, why are
you signing messages with your private key and sending them to a public
mailing list?  No one receiving the messages will be able to make use of
the signature in the slightest.

On a more general note, the article you've linked has some social
critiques of reliance on keysigning, but has no real commentary on the
danger of public key cryptography.  Isn't the point of public key
cryptography to allow one piece of a key to be read by any party while
keeping the problem of recovering the encrypted data intractable?  If
you are restricting heavily the people you share your public key with,
why not simply use a symmetric algorithm, forgetting public key
cryptography completely?  It would certainly render the problem of
recovering any encrypted communication far less tractable.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 490 bytes
Desc: not available
URL: </pipermail/attachments/20120827/37ba731b/attachment.pgp>

More information about the Gnupg-users mailing list