On 3/21/2016 at 3:04 PM, "Werner Koch" <w...@gnupg.org> wrote:On Mon, 21 Mar 2016 10:44, paolo.bolzoni.br...@gmail.com said:
> myself as recipient when encrypting a file, of course, in addition of > the real recipient. That allows you to delete the plaintext while still being able to get it back. > Is there a reason not to? If you want to send an anonymous message it is better not to encrypt to an additional key. It is also smart not to use a wildcard (--throw-keyid) for your own key so that in case your secret key leaks it won't be possible to show that the message has also been encrypted to you. ===== A simple working to accomplish this, is to additionally symmetrically encrypt the message. Use the session key from a message encrypted only to your secret key, as the passphrase for the additionally symmetrically encrypted message. ( (afaik), there is minimal danger in continuing to use this passphrase for additional symmetrical messages.) It will allow decryption of sent messages, while providing anonymity. vedaal _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users