Fritz Wuehler: >> That leads to the idea that having the cryptographic keys and >> signature of one Emmanuel Goldstein instantly makes you Emmanuel >> Goldstein beyond the proof of any photo ID telling another story. > No. keys can be and are stolen.
I wasn't aware of this kind of argument. So if I have the key of EG, I can walk away free just by saying they're stolen? >> So may I ask you why are you using the GPG keys? > > Your anonymity, through whichever tool you are using, depends on > cryptographic signatures. For instance, you seem to be posting from > riseup.net to protect your identity. *Seem to be.* But you only know > you are even > connecting to their server via their RSA sigs via their SSL certificate. > > And how to verify that? and so on... > > So on some level PGP/GPG or some variation becomes important also for > "anonymity." Tor, for instance, depends completely on crypto signatures > to function. I am aware of the usage of asymetric keys in daily computing. SSL, TLS, WPA, and so on. But why are YOU using the GPG keys? _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users