On 28/08/14 00:58, Steve Jones wrote:
> On Sat, 23 Aug 2014 12:56:11 +0200
> Philip Jackson <philip.jack...@nordnet.fr> wrote:
> 
>> - the email address belongs to a person who does control the key and
>> he may or may not be the person named in the email address.  I am
>> risking my secrets with an unknown person.  I had better take care of
>> the nature of those secrets.  It looks like this is the case covered
>> by your original post.
> 
> Presumably you have an email address of the person for some reason,
> whether or not you want to send secrets to that address depends on
> where you got it. What you want to know is: how do you send those
> secrets securely? If the keyserver has certified the key with a
> challenge response protocol you've got your answer.
> 
> Ideally you'd have an email address and a fingerprint, but often you
> don't.

Whether or not I want to send secrets to a person depends on lots of things.  I
think at present that I would be unlikely to send any important secret by email.
 I cannot imagine my confidence levels on the person's identity or
trustworthiness being enhanced at all by a keyserver process alone.  Not even if
the keyserver were linked to a lie detector :-)

The question would always remain "Who is pulling his strings ?"



Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to