On 2021-08-27 at 18:35 +, Стефан Васильев via Gnupg-users wrote:
> Hi,
>
> I have not checked again, but can tell you from the past that they
> check what web browser you are using, because when you use an anti-
> fingerprint add on for your browser and it generates a User Agent
> string with
l0f4r0 wrote:
Hi Stefan, all,
Oops, I think I wanted to react sooner but didn't visibly...
8 mai 2021, 15:12 de stefan.vasi...@posteo.ru:
l0f4r0 wrote:
I don't use ProtonMail so I can't say.
But otherwise you have Tutanota (no phone number required):
https://tutanota.com/blog/posts/anonym
Hi Stefan, all,
Oops, I think I wanted to react sooner but didn't visibly...
8 mai 2021, 15:12 de stefan.vasi...@posteo.ru:
>> l0f4r0 wrote:
>>
>>> I don't use ProtonMail so I can't say.
>>>
>>> But otherwise you have Tutanota (no phone number required):
>>> https://tutanota.com/blog/posts/anony
Il 18/04/2013 05:12, mirimir ha scritto:
> Why would one cross-sign keys for identities used in different
> communities? That would link them, which seems counterproductive.
That would be useful to improve the WoT, and it wouldn't "link" 'em more
than any other signature: signing a key means you a
On Apr 17, 2013, at 11:12 PM, mirimir wrote:
> On 04/17/2013 06:45 PM, NdK wrote:
>
>> Il 17/04/2013 18:22, Doug Barton ha scritto:
>>
>>> It's very safe to assume that e-mail address harvesting from the key
>>> servers is not anything to worry about.
>> At least for now.
>> But spam is just on
On 04/17/2013 06:45 PM, NdK wrote:
> Il 17/04/2013 18:22, Doug Barton ha scritto:
>
>> It's very safe to assume that e-mail address harvesting from the key
>> servers is not anything to worry about.
> At least for now.
> But spam is just one of the possible issues...
>
> Anyway I can see that th
On 4/17/2013 8:32 AM, Diego Zuccato wrote:
> That could easily be abused (spammers, people writing to personal
> mailbox for work-related issues, etc), but even if not abused it's at
> least "unpleasant" that all mail addresses gets mixed.
This has been discussed ad nauseam in the past. Generally
Il 17/04/2013 19:09, Pete Stephenson ha scritto:
> While I don't use OpenPGP at my work, it seems reasonable to me to
> create separate primary keys for work and personal use.
Seems the only reasonable thing... for now :)
> In the US at least, companies have various regulatory requirements
> rela
Il 17/04/2013 18:22, Doug Barton ha scritto:
> It's very safe to assume that e-mail address harvesting from the key
> servers is not anything to worry about.
At least for now.
But spam is just one of the possible issues...
Anyway I can see that the easiest and more versatile solution is to have
d
On 4/17/2013 2:32 PM, Diego Zuccato wrote:
> Ave all.
>
> IIUC, currently, whoever looks up a key for an identity, automatically
> retrieves *all* user's identities!
Yup.
> That could easily be abused (spammers, people writing to personal
> mailbox for work-related issues, etc), but even if not
It's come up on the list many times. No one has demonstrated that there
is mass-mining of e-mail addresses from the key servers. Personally, I
have a mini-honeytrap set up for testing this, and while I get dozens of
spam messages every day as a result of having had my e-mail addresses
posted pu
Ave all.
IIUC, currently, whoever looks up a key for an identity, automatically
retrieves *all* user's identities!
That could easily be abused (spammers, people writing to personal mailbox
for work-related issues, etc), but even if not abused it's at least
"unpleasant" that all mail addresses gets
12 matches
Mail list logo