El 23/8/25 a las 0:34, Dale escribió:
Think it. You obtain the public key from one keyserver, you have the public key, the plaintext mail AND the encrypted one. Can you obtain the private key from this?Javier Martinez wrote:El 22/8/25 a las 23:45, Dale escribió:It is best when you start sending encrypted that you start a fresh email, don't reply to a unencrypted email with a encrypted one. If a hacker figures out some of the message based on what was not encrypted, it can then get the rest, or it makes it easier. That's my understanding anyway.I wouldn't be afraid with this, why? if it's truth anybody that send an encrypted mail could obtain private key from the receiver since has the plain text message and the public key. Assymetric cryptography are resillient because they use math operands really bigger, not simple multiplications and divisions, instead exponential ones and modulus from divisions. So it's something like starting that 3/2=1 with a modulus of 1. You have modulus, you can have the number 2, but how many numbers divided by 2 has a mod of 1, you dont have the division result only one of the divisors. So it could be all impar ones. Which one would be the correct one? (that is our private key). The numbers usually are prime numbers, really big primes. This is a very simplistic (and surely wrong) approach but it's like this.I'm no expert on this but I was told that mixing encrypted and not encrypted could make it easier for it to be hacked. If you are sure it is not, then go ahead and send mixed ones. If you right, no problem. If you wrong, well, you the one that gets hacked. I hope it's not info you don't want known to others. Dale :-) :-)
You can't.Take note that if what you says would be truth, anyone with access to the public key could access to the private key. It's not the case.
OpenPGP_0x57E64E0B7FC3BEDF.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature

