Editing Talk:1181: PGP
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 43: | Line 43: | ||
What would have been really funny is if the email content showed an attempt at [http://en.wikipedia.org/wiki/Nigerian_scam Nigerian Scam]. [[User:Abhaysk|Abhaysk]] ([[User talk:Abhaysk|talk]]) 01:06, 12 March 2013 (UTC) | What would have been really funny is if the email content showed an attempt at [http://en.wikipedia.org/wiki/Nigerian_scam Nigerian Scam]. [[User:Abhaysk|Abhaysk]] ([[User talk:Abhaysk|talk]]) 01:06, 12 March 2013 (UTC) | ||
:"As several others have noted, PGP can be used to encrypt and/or authenticate a message. I'd argue that the latter function is of little utility in the real world" :I'd argue the opposite, spoofing an email is trivial, reading someone elses email is somewhat harder. Having a policy of only performing certain actions based on signed mails from known keys makes a lot of sense. [[Special:Contributions/141.101.98.51|141.101.98.51]] 13:36, 18 March 2014 (UTC) | :"As several others have noted, PGP can be used to encrypt and/or authenticate a message. I'd argue that the latter function is of little utility in the real world" :I'd argue the opposite, spoofing an email is trivial, reading someone elses email is somewhat harder. Having a policy of only performing certain actions based on signed mails from known keys makes a lot of sense. [[Special:Contributions/141.101.98.51|141.101.98.51]] 13:36, 18 March 2014 (UTC) | ||
β | |||
β |