That's not "commonly recognized" at all. :) Personally I have what I believe is a better alternative:

https://dougbarton.us/PGP/gen_challenges.html

And for what it's worth, there is another package that does what you describe:

https://www.phildev.net/pius/


On 9/30/15 9:22 AM, Jérémy Bobbio wrote:
Hi!

It is commonly recognized that the best way to certify a key was to
sign the key in a temporary keyring, extract that signature, and mail it
encrypted to the email address. This has two main advantages: 1. we can
assert that whoever controls the key also control the email address;
2. people are free to choose if they want to publish the signatures
themselves (or not).

The two piece of software I know who implement this behavior is
caff [1] and monkeysign [2].

One of the hard thing we both tools, even if monkeysign is better, is to
setup what is needed to send the encrypted emails.

And then I realized that Enigmail was actually an add-on for a tool that
already knows how to send encrypted emails quite well. So this is a kind
feature request to add a similar feature to Enigmail.

  [1]: https://wiki.debian.org/caff
  [2]: http://web.monkeysphere.info/monkeysign/

Thanks!




--
I am conducting an experiment in the efficacy of PGP/MIME signatures. This message should be signed. If it is not, or the signature does not validate, please let me know how you received this message (direct, or to a list) and the mail software you use. Thanks!

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
enigmail-users mailing list
[email protected]
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to