Hi Viktor,
* Viktor Rosenfeld <[EMAIL PROTECTED]> [24. Jul. 2002]:
> David T-G wrote:
> > ...and then Phil Gregory said...
> > % encrypt-to <your key ID>
> > %
> > % to your ~/.gnupg/options file. This leaves them encrypted on disk but
> > % still allows you to go back and look at them.
> >
> > ... and allows anyone who knows your keyid to know that the message has
> > been encrypted to your key as well, thereby making the message very
> > not-anonymous. Just so you're aware...
>
> Hmm, good point. Then again, I almost always sign my messages anyway,
> so the key id is there in any case. But the idea with a secred,
> unpublished key is nice.
Pgp/gpg first sign then encrypt. So only the repicient can check
the sig (after encrypting the message).
With gnupg you may even use
--throw-keyid
Do not put the keyid into encrypted packets.
This option hides the receiver of the message and
is a countermeasure against traffic analysis. It
may slow down the decryption process because all
avail- able secret keys are tried.
So it is possible to send messages encrypted, signed and anonymously.
Ciao, Gregor
--
"The future is here. It's just not widely distributed yet."
-- William Gibson