Modernizing Web-of-trust for Organizations
andrewg at andrewg.com
Fri Jan 5 10:13:52 CET 2018
> On 5 Jan 2018, at 08:41, Lou Wynn <lewisurn at gmail.com> wrote:
> The only need for an
> organization to access their data is decrypting the encrypted data,
> which is satisfied by the auditing key.
The standard way of doing this without allowing for impersonation is escrow of the encryption subkey only. This can be done by encrypting the E subkey to the auditing key, the private key of which is presumably well controlled.
More information about the Gnupg-users