Home
Main website
Display Sidebar
Hide Ads
Recent Changes
View Source:
WhySignEmail
Edit
PageHistory
Diff
Info
LikePages
!!! Why Worry About The Entire PublicKeyInfrastructure Thing? ! Verifying Remote Users On the Undernet [IRC] network we have ScriptKiddie~s try and disrupt anything and everything they can. They have in the past forged emails from core developers with patches to be applied. If you contribute to FreeSoftware or the OpenSource movement then you are likely to have to interact with developers at potentially very remote locations, are you going to phone them up after every email to make sure they sent it? Using [GPG] and having a PublicKey in the WebOfTrust is now a prerequsite to becoming a [Debian] developer. ! Automated Verification Voting in [Debian] elections is performed automatically and securely using [GPG] signed [Email] votes. ! Future Proofing It takes time to build up a [PKI]. By getting your key signed today, and signing other peoples keys then when you need to send email to someone else in the world you will hopefully already have a trust path to them. ! Raise Awareness Setting up a loose [PKI] is very simple especially if your email client supports it natively. By signing outgoing messages you're raising awareness about signed and encrypted email. ! Setting a pattern If you have never signed an email in your life and someone forges an email from you containing important information (eg: "I am going to officially resign from my place of work"), then you can't argue that "if it was important then I would have sent it encrypted/signed! It obviously wasn't from me!" ! Spam Any email that is encrypted (that you can decrypt of course...) is unlikely to be spam -- spending time encrypting the same message for millions of recipients costs the sender far too much in CPU time. Any encrypted email is obviously important and personal. You can also use the web of trust as a way of figuring out who spammers are. If the email you recieved is signed by someone in your web of trust then they are unlikely to be a spammer. If it turns out that they are you can set their level of trust to "none" and perhaps lower the amount of trust of everyone who signed their key. A spammer will have a hard time finding people to sign their new key every time they want to send another email. ! Viruses Email [Virus]es typically send themselves to random recipients with a fake <tt>From:</tt> header, so yours will invariably be used even if you run a better OperatingSystem. If you have a history of signing your email, it is easier to convince other people that you didn't send them a particular email. (The Sobig family of viruses have been very successful at propagating using email). ---- Part of CategorySecurity
4 pages link to
WhySignEmail
:
GPG
WebOfTrust
EnigMail
GPG/PGPNotes