On Sa, Aug 18 2012, Daniel Kahn Gillmor wrote:
On 08/17/2012 11:16 AM, Hauke Laging wrote:
Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
or what key ID
had been used in conjunction with that option? Thanks.
You need the private recipient key in order to find out that key
ID. It's the
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger
clou...@informationelle-selbstbestimmung-im-internet.de wrote:
if a message M is encrypted to you and other
recipients using RSA, then you are of course able to obtain the
session key K. Now, if you suspect Alice to be a recipient then
On Mo, Aug 20 2012, ved...@nym.hush.com wrote:
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger
clou...@informationelle-selbstbestimmung-im-internet.de wrote:
if a message M is encrypted to you and other
recipients using RSA, then you are of course able to obtain the
session key K.
=
The one sending the message really is in control here ;-)
The sender can use hidden encrypt to ANY public key.
i.e. if Alice is sending the message and wants to hide her
identity,
nothing prevents her from using throw-keyid with Bob's public key
instead of her own, or NIST's, or
On Mon, 20 Aug 2012 13:57:41 -0400 Jens Lechtenboerger
clou...@informationelle-selbstbestimmung-im-internet.de wrote:
In contrast, I interpreted the original question in terms of
recipient anonymity: Bob wants to encrypt a message to some
undisclosed list of recipients (say, including Alice and