[OT] Why are you using the GPG / PGP keys?
Zece Anonimescu
zece at riseup.net
Fri May 24 23:12:32 CEST 2013
Fritz Wuehler:
>> That leads to the idea that having the cryptographic keys and
>> signature of one Emmanuel Goldstein instantly makes you Emmanuel
>> Goldstein beyond the proof of any photo ID telling another story.
> No. keys can be and are stolen.
I wasn't aware of this kind of argument. So if I have the key of EG, I
can walk away free just by saying they're stolen?
>> So may I ask you why are you using the GPG keys?
>
> Your anonymity, through whichever tool you are using, depends on
> cryptographic signatures. For instance, you seem to be posting from
> riseup.net to protect your identity. *Seem to be.* But you only know
> you are even
> connecting to their server via their RSA sigs via their SSL certificate.
>
> And how to verify that? and so on...
>
> So on some level PGP/GPG or some variation becomes important also for
> "anonymity." Tor, for instance, depends completely on crypto signatures
> to function.
I am aware of the usage of asymetric keys in daily computing. SSL, TLS,
WPA, and so on. But why are YOU using the GPG keys?
More information about the Gnupg-users
mailing list