Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Jens Lechtenboerger
On Sa, Aug 18 2012, Daniel Kahn Gillmor wrote: On 08/17/2012 11:16 AM, Hauke Laging wrote: Am Fr 17.08.2012, 09:56:56 schrieb auto15963931: or what key ID had been used in conjunction with that option? Thanks. You need the private recipient key in order to find out that key ID. It's the

Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread vedaal
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger clou...@informationelle-selbstbestimmung-im-internet.de wrote: if a message M is encrypted to you and other recipients using RSA, then you are of course able to obtain the session key K. Now, if you suspect Alice to be a recipient then

Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Jens Lechtenboerger
On Mo, Aug 20 2012, ved...@nym.hush.com wrote: On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger clou...@informationelle-selbstbestimmung-im-internet.de wrote: if a message M is encrypted to you and other recipients using RSA, then you are of course able to obtain the session key K.

Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Sin Trenton
= The one sending the message really is in control here ;-) The sender can use hidden encrypt to ANY public key. i.e. if Alice is sending the message and wants to hide her identity, nothing prevents her from using throw-keyid with Bob's public key instead of her own, or NIST's, or

Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread vedaal
On Mon, 20 Aug 2012 13:57:41 -0400 Jens Lechtenboerger clou...@informationelle-selbstbestimmung-im-internet.de wrote: In contrast, I interpreted the original question in terms of recipient anonymity: Bob wants to encrypt a message to some undisclosed list of recipients (say, including Alice and