https://dougbarton.us/PGP/gen_challenges.html
And for what it's worth, there is another package that does what you describe:
https://www.phildev.net/pius/ On 9/30/15 9:22 AM, Jérémy Bobbio wrote:
Hi! It is commonly recognized that the best way to certify a key was to sign the key in a temporary keyring, extract that signature, and mail it encrypted to the email address. This has two main advantages: 1. we can assert that whoever controls the key also control the email address; 2. people are free to choose if they want to publish the signatures themselves (or not). The two piece of software I know who implement this behavior is caff [1] and monkeysign [2]. One of the hard thing we both tools, even if monkeysign is better, is to setup what is needed to send the encrypted emails. And then I realized that Enigmail was actually an add-on for a tool that already knows how to send encrypted emails quite well. So this is a kind feature request to add a similar feature to Enigmail. [1]: https://wiki.debian.org/caff [2]: http://web.monkeysphere.info/monkeysign/ Thanks!
--I am conducting an experiment in the efficacy of PGP/MIME signatures. This message should be signed. If it is not, or the signature does not validate, please let me know how you received this message (direct, or to a list) and the mail software you use. Thanks!
signature.asc
Description: OpenPGP digital signature
_______________________________________________ enigmail-users mailing list [email protected] To unsubscribe or make changes to your subscription click here: https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net
