El 23/8/25 a las 1:13, Dale escribió:
Javier Martinez wrote:
El 23/8/25 a las 0:34, Dale escribió:
Javier Martinez wrote:
El 22/8/25 a las 23:45, Dale escribió:
It is best when you start sending encrypted that you start a fresh
email, don't reply to a unencrypted email with a encrypted one.  If a
hacker figures out some of the message based on what was not
encrypted,
it can then get the rest, or it makes it easier.  That's my
understanding anyway.

I wouldn't be afraid with this, why? if it's truth anybody that send
an encrypted mail could obtain private key from the receiver since has
the plain text message and the public key.

Assymetric cryptography are resillient because they use math operands
really bigger, not simple multiplications and divisions, instead
exponential ones and modulus from divisions. So it's something like
starting that 3/2=1 with a modulus of 1. You have modulus, you can
have the number 2, but how many numbers divided by 2 has a mod of 1,
you dont have the division result only one of the divisors. So it
could be all impar ones. Which one would be the correct one? (that is
our private key). The numbers usually are prime numbers, really big
primes.

This is a very simplistic (and surely wrong) approach but it's like
this.


I'm no expert on this but I was told that mixing encrypted and not
encrypted could make it easier for it to be hacked.  If you are sure it
is not, then go ahead and send mixed ones.  If you right, no problem.
If you wrong, well, you the one that gets hacked. I hope it's not info
you don't want known to others.

Dale

:-)  :-)

Think it. You obtain the public key from one keyserver, you have the
public key, the plaintext mail AND the encrypted one. Can you obtain
the private key from this?

You can't.

Take note that if what you says would be truth, anyone with access to
the public key could access to the private key. It's not the case.



That's not what I'm saying.  Let's say you have a file that is plain,
not encrypted.  Then you have the same file that is encrypted.  One can
use the info from the not encrypted file to hack the encrypted one.  The
keys have nothing to do with it.  At least that is my understanding of
it.  Like I said, if you are 100% sure, don't worry about it.  Just send
some encrypted and some not.  If no one can hack it, no problem.  If
you're wrong tho and you are sharing info someone wants, well, you get
to keep the pieces.

Dale

:-)  :-)

Its not true
What do you think you are doing when you encrypt one mail to another one??? You have the one in plain, you have the the one encrypted and you can't obtain the private key from them. By this reason I tell you it has not sense. By your theory anyone with access to a public key since will has both mails, encrypted and the plain one, could get private key from them.

Attachment: OpenPGP_0x57E64E0B7FC3BEDF.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to