Hi, Alphax schrieb: > Suppose you send an email to Address W and encrypt an "authentication > token" to Key X. You recieve a reply from Address Y, containing the > authentication token, which has been signed with Key Z. > > This tells you that /someone/ with access to W has recieved a message; > /someone/ with access to X has decrypted it; /someone/ with access to Z > has signed a reply; and /someone/ with access to Y has sent a reply. > > Keys X and Z may or may not be the same key or subkeys of the same > primary key, addresses W and Y may or may not be the same, and Y may or > may not have been faked (which is trivial). Couldn't I check this by looking at the public keys they published at key servers?
Best wishes Michael -- Nobody can save your freedom but YOU - become a fellow of the FSF Europe! http://www.fsfe.org/en
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
