Am Donnerstag 10 März 2011 04:42:25 schrieb Ben McGinnes:

> Which brings us back to creating a pseudonym, using Tor (or other
> anonymising services), getting a disposable mail drop (or using
> alt.anonymous.messages) and going from there.  At the bare minimum.

A little practical advantage: If gpg had such a feature then the documentation 
may mention everything that is needed additionally (depending on the targetet 
opponent: spammers, facebook-alikes, secret police) or useful. Then people in 
a bad situation (which are probably no security experts) had a trustworthy 
source of information for planning their communication strategy.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to