Am Donnerstag 10 März 2011 04:42:25 schrieb Ben McGinnes: > Which brings us back to creating a pseudonym, using Tor (or other > anonymising services), getting a disposable mail drop (or using > alt.anonymous.messages) and going from there. At the bare minimum.
A little practical advantage: If gpg had such a feature then the documentation may mention everything that is needed additionally (depending on the targetet opponent: spammers, facebook-alikes, secret police) or useful. Then people in a bad situation (which are probably no security experts) had a trustworthy source of information for planning their communication strategy. Hauke -- PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
