On Tue, Jun 16, 2009 at 08:18:28AM -0600, Richard Johnson wrote:
> The people behind the address (it's an email reflector) all have their own
> gpg and pgp keys [1].  

The best way to handle this is to have the e-mail reflector do it.
The e-mail reflector should provide a public key to which you encrypt
the mail, then it decrypts and re-encrypts to all the subscribers.
The "best" part of this is that the subscribers don't need to have
everyone else's keys.

One such list management software is here:

http://www.synacklabs.net/projects/crypt-ml/

It may be worth trying to get the manager of your mailing list to move
to this software, or similar.

Of course, in the general case, one would argue that exchanging
encrypted mail with people you do not know (and therefore can not
possibly trust) is rather pointless...  If your group has anything
truly worth encrypting, it's rather likely that it will be infiltrated
by exactly the sort of person you're trying to protect it from.  It
may be true that the list manager has a list of recipients, but
there's no guarantee that the list owner knows who the e-mail
addresses actually belong to, or cares.


-- 
Derek D. Martin    http://www.pizzashack.org/   GPG Key ID: 0xDFBEAD02
-=-=-=-=-
This message is posted from an invalid address.  Replying to it will result in
undeliverable mail due to spam prevention.  Sorry for the inconvenience.

Attachment: pgplivKnpYa69.pgp
Description: PGP signature

Reply via email to