Hi Dirk-Willem! Thanks for your reply - but I'm unfortunately lost as to your (what I surmise is your implied) hypothetical use-case?
Ref: On Tue, Dec 22, 2020 at 2:56 PM Dirk-Willem van Gulik <di...@webweaving.org> wrote: > Keep in mind that in some workplaces the building of that trust explicitly > includes the need for counter-intelligence - and hence a legitimate use of > fake signatures. > Though I have a hard time imagining a use case in the european private > sector for that. > Would you mind elaborating on when you'd foresee/imagine such a non-european/non-private sector have a need for this? There's nothing that would stop the user in question utilizing multiple separate "main" keys, and not just separate sub-keys per A, S, E capability in your scenario (even when A and S capabilities reside on the _same_ private/public sub-key pair). -- Med vennlig hilsen/Kind regards, Christian Chavez Phone/Tlf: +47 922 22 603
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users