-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Ulex Europae <europus@gmail.com> writes:
From: David Farber <dave@farber.net> Subject: [IP] Darn thing works -- Application that provides [Open]PGP for Webmail Date: Thu, 29 Nov 2012 11:50:38 -0500 To: "ip" <ip@listbox.com>
Begin forwarded message:
for dissection and commentary. Off the cuff, I do not see where the security comes from if the webmail server is compromised in the first damn place.
Assuming the correspondents exchange keys out of band, this looks like true end-to-end encryption, the keys residing on the users' respective machines. If so, server compromise can cause loss of service but no confidentiality or authentication breach. Please correct me if I'm wrong. Otherwise, this looks like an important new option for those who love their webmail, especially after the Firefox version becomes available. - -- -- StealthMonger <StealthMonger@nym.mixmin.net> Long, random latency is part of the price of Internet anonymity. anonget: Is this anonymous browsing, or what? http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df33?dmode=source&output=gplain stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite@nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite@nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.9 <http://mailcrypt.sourceforge.net/> iEYEARECAAYFAlC7xXwACgkQDkU5rhlDCl5hSwCfesrmWfRMjPHFVcljrgQDUVhC ZxIAn0zA07TNP5mG01HearMhvCxUC3Cb =fVL7 -----END PGP SIGNATURE-----