[OT] Why are you using the GPG / PGP keys?

Zece Anonimescu zece at riseup.net
Fri May 24 23:12:32 CEST 2013


Fritz Wuehler:
>> That leads to the idea that having the cryptographic keys and
>> signature of one Emmanuel Goldstein instantly makes you Emmanuel
>> Goldstein beyond the proof of any photo ID telling another story.
> No.  keys can be and are stolen.

I wasn't aware of this kind of argument. So if I have the key of EG, I
can walk away free just by saying they're stolen?

>> So may I ask you why are you using the GPG keys?
> 
> Your anonymity, through whichever tool you are using, depends on
> cryptographic signatures.  For instance, you seem to be posting from
> riseup.net to protect your identity.  *Seem to be.*  But you only know
> you are even
> connecting to their server via their RSA sigs via their SSL certificate.
> 
> And how to verify that?  and so on...
> 
> So on some level PGP/GPG or some variation becomes important also for
> "anonymity."  Tor, for instance, depends completely on crypto signatures
> to function.

I am aware of the usage of asymetric keys in daily computing. SSL, TLS,
WPA, and so on. But why are YOU using the GPG keys?




More information about the Gnupg-users mailing list