1998-12-24 - Re: mysterious PGP release-signing keys

Header Data

From: Patrick Feisthammel <pafei@rubin.ch>
To: Alex Alten <Alten@home.com>
Message Hash: 4e25c23cfa9d048975477c2d6f6bd83e89cebe32c25a6e7c6e1bd32103481bb8
Message ID: <Pine.LNX.3.96.981224085732.28869A-100000@dns.h.rubin.ch>
Reply To: <3.0.3.32.19981223195440.00b29970@mail>
UTC Datetime: 1998-12-24 08:25:18 UTC
Raw Date: Thu, 24 Dec 1998 16:25:18 +0800

Raw message

From: Patrick Feisthammel <pafei@rubin.ch>
Date: Thu, 24 Dec 1998 16:25:18 +0800
To: Alex Alten <Alten@home.com>
Subject: Re: mysterious PGP release-signing keys
In-Reply-To: <3.0.3.32.19981223195440.00b29970@mail>
Message-ID: <Pine.LNX.3.96.981224085732.28869A-100000@dns.h.rubin.ch>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

Hi Alex!

> This is yet another a good example of why one should never confuse using PK 
> certificates with security.  An email PGP signature looks impressive but in
> practice it is useless.

It is usefull iff you can verify the validity of the used PK certificate.
That's what the web of trust in PGP is for.

Cheers,
Patrick

- ---
PGP-KeyID: DD934139 (pafei@rubin.ch)    encrypt mail with PGP if possible
more about PGP on http://www.rubin.ch/pgp/ (english and german)
what ist the web of trust? see http://www.rubin.ch/pgp/weboftrust.en.html
Das Vertrauensnetz von PGP:    http://www.rubin.ch/pgp/weboftrust.de.html

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQESAwUBNoH0kpVgYabdk0E5AQHENgfjBRrYXjTfvo6NMbx/ktK23yeiKibeTfSZ
lbjZCdT+Vp433IAAtz4EHgC1vbSHaA04CdvPrX2cTYqeJAP7RQzGgbZVg7P9p23C
rFYoPtLdCXEiH9GDG48TuqFTUBvJrLMIZXIoSS/ZhMQMASim9zDF/gLQP0/VGicc
QwCjwogFed+R0uvoleZh0YhhEnkIKkLDM4a9pDcLKi9uryspeD6VrWevegmJpzXM
aSQBlpMuTdOXcmaThEqgblP7YeAzK8Q4IdT2oNsCpUx4DntzX/bJ5fOKYjRLdy10
4ctSlXOqYOWZmjVnF4lRFDmI1dwfX0hf7uHTBRG6lh913hAIVg==
=ktwt
-----END PGP SIGNATURE-----





Thread