On 13-10-22 04:57 PM, MFPA wrote:
> Hi

Hi,

> It appears you probably meant the communication with
> "bob@corporate.domain" was the out-of-band channel by which you and
> Bob told each other your OpenPGP key fingerprints, and that being able
> to send emails from those corporate accounts also doubled as identity
> verification (because only the individual knows the relevant
> credentials to send from "their" corporate email address, and the
> company is required to verify government-issued ID documents when
> engaging staff).

Indeed.  You have it exactly.  Sorry I was not more clear about these
details in the beginning.

> As for use of a corporate email address, could I be sure that Bob
> locked his computer every time he left his desk? Or that nobody else
> would ever have access to a written record of Bob's passwords? Or
> that, in Bob's absence, a substitute would never use Bob's email
> address when covering his work?

Indeed.  Those are all things you'd have to take into account, just like
having to take into account the risk of IT being involved in a black-hat
role in all of this.

I have to admit that any/all of those possibilities make me wary of such
a scheme.  I think I'd have to be able to "test" Bob on the other end of
the OOB comms channel to use such a scheme.  That seems to imply some
level of familiarity with Bob, which might not be unreasonable
considering we might work together.

Cheers,
b.




Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to