symmetric email encryption

MFPA 2014-667rhzu3dc-lists-groups at riseup.net
Sat Jul 19 16:30:54 CEST 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi


On Friday 18 July 2014 at 8:23:08 PM, in
<mid:20140718192308.47A05A0147 at smtp.hushmail.com>, vedaal at nym.hush.com
wrote:


> The only annoyance with this type of approach, is that
> it needs a separate passphrase for each correspondent,

How? Running "gpg --symmetric test.txt" only gives me the opportunity
to enter one passphrase for the encryption.



> Hushmail has a one-way variant of this approach.

[snipped]

> The receiver gets a message that an encrypted e-mail
> has been sent, and is directed to the Hushmail server
> where the sender's question is asked, and the receiver
> has 3 chances to provide the correct answer.  A correct
> answer decrypts the symmetrically encrypted e-mail and
> the plaintext is displayed on the Hushmail server. The
> e-mail is removed from the server after 72 hours.

It is a good idea to tell the recipient in advance. Otherwise they
just see yet another unsolicited email suggesting to follow a link or
visit an unfamiliar website.


- --
Best regards

MFPA                    mailto:2014-667rhzu3dc-lists-groups at riseup.net

Don't cry because it is over - smile because it happened
-----BEGIN PGP SIGNATURE-----

iPQEAQEKAF4FAlPKgS5XFIAAAAAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pXkgD/j3s56ApdFNwcjFY3SREkocyGxXGDtONA8Z4
nYeO60nOP3w95+p9t49aBfKxNTjoaix3MwlAzSbvtr8JU+0ZoiAZ6Kmlg88eLYYm
Zbt2eQqIpqwPhZjBCe9p2ZyTKW5gBnVSbYIZpB7Wj5fle+RoRpJHMMogjmhakdlc
YGmDRaVH
=8lgV
-----END PGP SIGNATURE-----




More information about the Gnupg-users mailing list