Nvm, apologies for the spam.
I retract my question now after having conferred with a third-party.

I understand now your hypothetical scenario - thanks!

Does anyone else have any thoughts on the reduced complexity of juggling
multiple (sub?)keys vs the security implications of not separating
Authentication/Signing to different (sub?)keys?

On Tue, Dec 22, 2020 at 4:16 PM Christian Chavez <x10a...@gmail.com> wrote:

> Hi Dirk-Willem!
> Thanks for your reply - but I'm unfortunately lost as to your (what I
> surmise is your implied) hypothetical use-case?
>
> Ref:
> On Tue, Dec 22, 2020 at 2:56 PM Dirk-Willem van Gulik <
> di...@webweaving.org> wrote:
>
>> Keep in mind that in some workplaces the building of that trust
>> explicitly includes the need for counter-intelligence - and hence a
>> legitimate use of fake signatures.
>> Though I have a hard time imagining a use case in the european private
>> sector for that.
>>
>
> Would you mind elaborating on when you'd foresee/imagine such a
> non-european/non-private sector have a need for this?
> There's nothing that would stop the user in question utilizing multiple
> separate "main" keys, and not just separate sub-keys per A, S, E
> capability  in your scenario (even when A and S capabilities reside on the
> _same_ private/public sub-key pair).
>
> --
> Med vennlig hilsen/Kind regards,
> Christian Chavez
> Phone/Tlf: +47 922 22 603
>


-- 
Med vennlig hilsen/Kind regards,
Christian Chavez
Phone/Tlf: +47 922 22 603
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to