Gracias Faramir y Allen!

On Sun, Jun 28, 2009 at 11:09 AM, Faramir<faramir...@gmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Jesse Cheung escribió:
>> Dear all,
>>   I learned that public keyservers are a good way for key exchanges.
>> But I am still a little concerned: after all, the UID's contain my
>> email addresses so by sending my keys up I am exposing my email
>> address to everybody. I'm not sure if there are spammers out there
>> doing all these key queries looping over every key-id, but it sounds
>> technically possible doesn't it (unless the key-id's are statistically
>> _very very_ sparse)?
>
>  Indeed, there are some spammers gathering email addresses from
> keyservers, but it seems (from previous discussions about that in the
> list) it is not notorious among all the other spam sources...
I am very new here, so would anybody kindly give me a reference where
this previous discussions happened?

>
>  You can also use a freeform UID, which contains name and comment, but
> leave the email field empty.
Yeah I found it a good idea! BTW it seems the file format doesn't
really stop us from putting invalid email address in the UID, so is
there a switch in gpg/gpg2 command line that skips email address
format checking altogether? My intension is to put obscured email
addresses, like rot13(xxx) or reversed(at-dot(email)) kind of stuff in
that field. Seahorse can do that, but only when generating keys, not
adding new UIDs

Cheers,
Jesse

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to