On Mon, 20 Aug 2012 13:57:41 -0400 Jens Lechtenboerger
wrote:
>In contrast, I interpreted the original question in terms of
>recipient anonymity: Bob wants to encrypt a message to some
>undisclosed list of recipients (say, including Alice and Eve), and
>nobody should be able to figure out who (e
> =
>
> The one sending the message really is in control here ;-)
> The sender can use hidden encrypt to ANY public key.
>
> i.e. if Alice is sending the message and wants to hide her
> identity,
> nothing prevents her from using throw-keyid with Bob's public key
> instead of her own, or NI
On Mo, Aug 20 2012, ved...@nym.hush.com wrote:
> On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger
> wrote:
>
>> if a message M is encrypted to you and other
>>recipients using RSA, then you are of course able to obtain the
>>session key K. Now, if you suspect Alice to be a recipient then
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger
wrote:
> if a message M is encrypted to you and other
>recipients using RSA, then you are of course able to obtain the
>session key K. Now, if you suspect Alice to be a recipient then
>you download her public key from a key server and encr
On Sa, Aug 18 2012, Daniel Kahn Gillmor wrote:
> On 08/17/2012 11:16 AM, Hauke Laging wrote:
>> Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
>>> or what key ID
>>> had been used in conjunction with that option? Thanks.
>>
>> You need the private recipient key in order to find out that key
>>