PGP 5.5 available outside US

It seems that unknown Cypherpunks have yet again shown their disrespect of US export laws by exporting the latest version of PGP. The Windows version of PGP 5.5 is now available for your downloading pleasure at ftp://ftp.replay.com/pub/crypto/incoming/PGP55.zip PGP 5.5 features superior LDAP keyserver integration, multiple signature categories, and automatic decryption (set Preferences -> Email -> Automatically Decrypt). "You heard the rumors. Now try it yourself." :-) -- Lucky Green <shamrock@cypherpunks.to> PGP encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?"

Lucky Green wrote:
PGP 5.5 features superior LDAP keyserver integration, multiple signature categories, and automatic decryption (set Preferences -> Email -> Automatically Decrypt).
How does the keyserver integration work? Is it possible to have PGP automatically fetch the public key from the servers whenever I read a signed message, and to show me if this newly fetched key is in my web of trust? I want the key fetched every time, not cached locally on my own key ring, so that revocations shows up immediately. Is the communications channel to the key server encrypted, so that a passive listener won't see what keys I fetch? I understand that anybody who breaks root on the key servers will see a lot of interesting traffic. Can we do anything about that? Mike.
participants (2)
-
Lucky Green
-
Mike