On 2016-02-25 15:50, Kristian Fiskerstrand wrote:
(in particular in
cases where action from yourself is required, default key for signing
etc).
I agree. Note that the discussed case, encrypt-to, silently encrypts to
unvalidated keys that happen to be on a keyring. Just pick any key on
your keyring that isn't valid, say it's mine, AC46EFE6DE500B3E, and put
this in your gpg.conf (watch out what you're doing here, though!):
encrypt-to AC46EFE6DE500B3E
Now encrypt a test message to anyone, something like:
echo "I'm talking to myself" | gpg2 -o test.gpg -r E3EDFAE3 -e
Note how happy GnuPG is to do all this, and then do
gpg2 --list-only --list-packets test.gpg
Note how the unvalidated key is silently encrypted to without a peep
from GnuPG.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at
<http://digitalbrains.com/2012/openpgp-key-peter>
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users