getting an encrypted file to show what public key was used

Hauke Laging mailinglisten at hauke-laging.de
Tue May 29 17:36:25 CEST 2012


Am Di 29.05.2012, 11:28:36 schrieb Robert J. Hansen:

> This goes to underline the importance of proper certificate validation.
> If I have the sequence of events correct, then it could have been
> avoided entirely if there had been a Step 4.5, "validate the certificate
> he just received."

Looks like a nice possibility for checking how serious the handling of keys by 
your partners is: Create a key with a short ID collision for a key available 
on the keyservers and give them the short ID... 8-)


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 555 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20120529/fe778e43/attachment.pgp>


More information about the Gnupg-users mailing list