-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Sun, Dec 01, 2002 at 06:18:12PM -0800, Edifice Wrecks wrote: > [the wonderful world of PGP] > > Using keyservers for signature verification wouldn't provide any > particularly high security. Identities on a keyserver can be forged > too. The only cryptographic information you should ever fully trust > is information traceable to trusted out-of-band channels.
So, there are a lot of opportunities to exchange key fingerprint: seminars, meetings, gooddies, phone calls. Print your PGP key fingerprint on the back of your business card. Establish a web of trust with your fellow exchange agents. Maybe an agenda item for the next eCTA meeting? Joris Bontje - -- PGP Key: http://pgp.dtype.org:11371/pks/lookup?op=get&search=0xF19326A9 Key fingerprint = 730D 9B3A F406 F28A 957D 6397 31E8 6D4C F193 26A9 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE963tVMehtTPGTJqkRAhO9AJ91dcuv386abZCM1KQ3b9+beMpFvwCdGlvX ZGmPXTKpnulmedLFGrDYHF4= =MlbW -----END PGP SIGNATURE----- --- You are currently subscribed to e-gold-list as: archive@jab.org To unsubscribe send a blank email to [EMAIL PROTECTED] Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold account(s) via the web and shopping cart interfaces to help thwart keystroke loggers and common viruses.