The only idea is, they have something which looks automatically for
sender's pubkeys on keyservers oder anywhere else, no matter if
useful/valid/expired or not and then encrypts against these keys. In the
best case you should be able to decrypt this *.asc attachment with one
of your keys?
IIRC I had a similar scenario some years ago, don't remember whether
this was an insurance company or a telecom provider or something
else..... IIRC they encrypted anything, not just autoreplies, against
the first best fitting pubkey they found on keyservers. I don't remember
whether I could decrypt that stuff or not....
Regards
also Matthias :-)
Am 22.01.2025 11:32, schrieb Matthias Apitz:
Hello,
I asked an Insurance Company in its web pages for contacting me
and got the two attachments without any further text in the body of the
mail. What can or should I do to read the encrypted text?
Thanks
matthias
----- Forwarded message from VHV Versicherungen <serv...@vhv.de> -----
Date: Wed, 22 Jan 2025 10:55:58 +0100
From: VHV Versicherungen <serv...@vhv.de>
To: "g...@unixarea.de" <g...@unixarea.de>
Subject: VHV – Automatische Eingangsbestätigung
----- End forwarded message -----
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
--
Unsere Korrespondenz kann mitgelesen werden. Wollen Sie das
erschweren, mailen wir uns gerne mit (Open)PGP verschlüsselt.
-
Matthias Mansfeld Elektronik * Leiterplattenlayout
Neithardtstr. 3, 85540 Haar; Tel.: 089/4620 093-7, Fax: -8
Internet: http://www.mansfeld-elektronik.de
OpenPGP: http://www.mansfeld-elektronik.de/gnupgkey/mansfeld.asc
Fingerprint: 6563 057D E6B8 9105 1CE4 18D0 4056 1F54 8B59 40EF
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users