lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030131212529.GH6545@phobos.fs.tum.de>
From: Simon.Richter at hogyros.de (Simon Richter)
Subject: The worm author finally revealed!

Henrik,

> I guess many people also thinks that having a PGP signature on mails
> make them - true (while paranoid people would actually verify the 
> signatures)

No, PGP signatures help me establish trust to individuals by allowing me
to connect messages by the same individual to each other and then decide
whether I trust that person. That a key also has a more-or-less
pronounceable name embedded simply helps my brain to remember which
individual was just talking.

> even IF the PGP signature verifies clean the content might be
> fake, or a joke in this case

Erm, the contents may be fake, but this comes seldom from someone who
you already trust through what he/she said before. Of course, this
system is subject to social engineering, but I couldn't think of a
better system.

   Simon

-- 
GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD  ADC6 18A0 CC8D 5706 A4B4
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030131/2d5e22cf/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ