Editing Talk:1181: PGP

Jump to: navigation, search
Ambox notice.png Please sign your posts with ~~~~

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 10: Line 10:
  
 
I think merely the fact that PGP is in the email itself suggests the sender of the email is probably just a big nerd and therefore can be trusted. {{unsigned|153.90.91.1}}
 
I think merely the fact that PGP is in the email itself suggests the sender of the email is probably just a big nerd and therefore can be trusted. {{unsigned|153.90.91.1}}
: You are the type of person that the comic is making fun of. You assume it's safe and don't bother to verify it. [[Special:Contributions/108.162.212.18|108.162.212.18]] 16:37, 28 June 2014 (UTC)
 
  
 
Isn't it that those markers could very simply just have been typed in, rather than being part of the decryption system? [[User:DonGoat|DonGoat]] ([[User talk:DonGoat|talk]]) 07:41, 4 March 2013 (UTC)
 
Isn't it that those markers could very simply just have been typed in, rather than being part of the decryption system? [[User:DonGoat|DonGoat]] ([[User talk:DonGoat|talk]]) 07:41, 4 March 2013 (UTC)
Line 42: Line 41:
  
 
What would have been really funny is if the email content showed an attempt at [http://en.wikipedia.org/wiki/Nigerian_scam Nigerian Scam]. [[User:Abhaysk|Abhaysk]] ([[User talk:Abhaysk|talk]]) 01:06, 12 March 2013 (UTC)
 
What would have been really funny is if the email content showed an attempt at [http://en.wikipedia.org/wiki/Nigerian_scam Nigerian Scam]. [[User:Abhaysk|Abhaysk]] ([[User talk:Abhaysk|talk]]) 01:06, 12 March 2013 (UTC)
:"As several others have noted, PGP can be used to encrypt and/or authenticate a message. I'd argue that the latter function is of little utility in the real world" :I'd argue the opposite, spoofing an email is trivial, reading someone elses email is somewhat harder. Having a policy of only performing certain actions based on signed mails from known keys makes a lot of sense. [[Special:Contributions/141.101.98.51|141.101.98.51]] 13:36, 18 March 2014 (UTC)
 
 
The best use of this is to purposely send emails with invalid signatures.  No one will ever notice since no one uses PGP.  But if someone ever tries to hold you accountable for an email you sent, you can explain how PGP authentication works and prove that your signature is invalid. [[Special:Contributions/108.162.216.190|108.162.216.190]] 13:49, 11 March 2015 (UTC)
 

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)

Template used on this page: