Hi Dirk-Willem!
Thanks for your reply - but I'm unfortunately lost as to your (what I
surmise is your implied) hypothetical use-case?

Ref:
On Tue, Dec 22, 2020 at 2:56 PM Dirk-Willem van Gulik <di...@webweaving.org>
wrote:

> Keep in mind that in some workplaces the building of that trust explicitly
> includes the need for counter-intelligence - and hence a legitimate use of
> fake signatures.
> Though I have a hard time imagining a use case in the european private
> sector for that.
>

Would you mind elaborating on when you'd foresee/imagine such a
non-european/non-private sector have a need for this?
There's nothing that would stop the user in question utilizing multiple
separate "main" keys, and not just separate sub-keys per A, S, E
capability  in your scenario (even when A and S capabilities reside on the
_same_ private/public sub-key pair).

-- 
Med vennlig hilsen/Kind regards,
Christian Chavez
Phone/Tlf: +47 922 22 603
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to