Editing Talk:1181: PGP
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | Everybody below seems to have misread the comic. It says nothing about 'verifying that the email is secure' or secret, or encrypted. It says verifying that the email is | + | Everybody below seems to have misread the comic. It says nothing about 'verifying that the email is secure' or secret, or encrypted. It says verifying that the email is AUTHENTIC. This is a significant difference in meaning.[[Special:Contributions/24.70.188.179|24.70.188.179]] 15:55, 4 March 2013 (UTC) |
− | |||
− | |||
− | |||
I don't really understand what's funny about this comic. [[Special:Contributions/76.106.251.87|76.106.251.87]] 05:53, 4 March 2013 (UTC) | I don't really understand what's funny about this comic. [[Special:Contributions/76.106.251.87|76.106.251.87]] 05:53, 4 March 2013 (UTC) | ||
Line 10: | Line 7: | ||
I think merely the fact that PGP is in the email itself suggests the sender of the email is probably just a big nerd and therefore can be trusted. {{unsigned|153.90.91.1}} | I think merely the fact that PGP is in the email itself suggests the sender of the email is probably just a big nerd and therefore can be trusted. {{unsigned|153.90.91.1}} | ||
− | |||
Isn't it that those markers could very simply just have been typed in, rather than being part of the decryption system? [[User:DonGoat|DonGoat]] ([[User talk:DonGoat|talk]]) 07:41, 4 March 2013 (UTC) | Isn't it that those markers could very simply just have been typed in, rather than being part of the decryption system? [[User:DonGoat|DonGoat]] ([[User talk:DonGoat|talk]]) 07:41, 4 March 2013 (UTC) | ||
Line 20: | Line 16: | ||
There is an interesting comparison to do with regular handwritten signature, as this is exactly how people check the authenticity of a handwritten signed document: check for a signature. If there is one, and if there is, even if you never saw a sample of that signature, trust it. However, as with cryptographic signature with an unknown key, this does rely one something: the fact that it is forbidden, and punishable, to counterfeit one's signature, even if it is badly done (as in: write a random signature, hoping that the recipient does not know the real signature of the alleged author). -- [[User:Elessar|Elessar]] ([[User talk:Elessar|talk]]) 09:02, 4 March 2013 (UTC) | There is an interesting comparison to do with regular handwritten signature, as this is exactly how people check the authenticity of a handwritten signed document: check for a signature. If there is one, and if there is, even if you never saw a sample of that signature, trust it. However, as with cryptographic signature with an unknown key, this does rely one something: the fact that it is forbidden, and punishable, to counterfeit one's signature, even if it is badly done (as in: write a random signature, hoping that the recipient does not know the real signature of the alleged author). -- [[User:Elessar|Elessar]] ([[User talk:Elessar|talk]]) 09:02, 4 March 2013 (UTC) | ||
− | |||
I agree with the commenters above me and I think the explanation goes into the wrong direction. This cartoon has nothing to do with encryption, it's only about (cryptographically) signing an e-mail. PGP can do both, but whilst signing is done using your own secret PGP key, for encryption you must have the public key of the recipient, so they must already know how to use PGP (or GnuPG) and have it installed. The cartoon is about people who either do not have PGP installed in their e-mail program or are using a web mailer (like many) that cannot handle cryptographically signed messages. For them, the signature is useless, unless they believe that the mere existence of a signature is a proof that the message is authentic. | I agree with the commenters above me and I think the explanation goes into the wrong direction. This cartoon has nothing to do with encryption, it's only about (cryptographically) signing an e-mail. PGP can do both, but whilst signing is done using your own secret PGP key, for encryption you must have the public key of the recipient, so they must already know how to use PGP (or GnuPG) and have it installed. The cartoon is about people who either do not have PGP installed in their e-mail program or are using a web mailer (like many) that cannot handle cryptographically signed messages. For them, the signature is useless, unless they believe that the mere existence of a signature is a proof that the message is authentic. | ||
Line 26: | Line 21: | ||
:You may be confusing "ASCII armored" (which in OpenPGP speak is "a BASE64-encoded version of the signature or encrypted text") with the encoding of the actual data (which may also be BASE64, or it may be Quoted-Nonprintable, or it may be actual plain-text ASCII). This separation line signals that signature will be at the end, and that the mail will not be encoded in PGP-MIME, which pretty much requires that the signature is ASCII armored.[[Special:Contributions/195.144.91.202|195.144.91.202]] 12:03, 4 March 2013 (UTC) | :You may be confusing "ASCII armored" (which in OpenPGP speak is "a BASE64-encoded version of the signature or encrypted text") with the encoding of the actual data (which may also be BASE64, or it may be Quoted-Nonprintable, or it may be actual plain-text ASCII). This separation line signals that signature will be at the end, and that the mail will not be encoded in PGP-MIME, which pretty much requires that the signature is ASCII armored.[[Special:Contributions/195.144.91.202|195.144.91.202]] 12:03, 4 March 2013 (UTC) | ||
− | |||
− | |||
:I also agree that the explanation doesn't really explain the point. PGP does not only provide encryption (which is in some sense privacy), but also authentication. If I publish my public key, anyone can use it to verify an email I signed with my private key. The joke is about what really happens. The text says: "If you find a header, this indicates a signed message. You are pretty safe if you assume the mail is authentic." This is funny, because email signatures are still so uncommon that there actually is no need to fake it. If you fake an email, why faking a signature? Just don't sign it. The image text goes one step further saying that you're safer when you look at the bottom of the mail and look for some weird random characters. This is what the actual signature looks like, but of course, the only way to really authenticate the mail is to use the sender's public key to verify that the random characters are a real signature. --[[User:BKA|BKA]] ([[User talk:BKA|talk]]) 12:19, 4 March 2013 (UTC) | :I also agree that the explanation doesn't really explain the point. PGP does not only provide encryption (which is in some sense privacy), but also authentication. If I publish my public key, anyone can use it to verify an email I signed with my private key. The joke is about what really happens. The text says: "If you find a header, this indicates a signed message. You are pretty safe if you assume the mail is authentic." This is funny, because email signatures are still so uncommon that there actually is no need to fake it. If you fake an email, why faking a signature? Just don't sign it. The image text goes one step further saying that you're safer when you look at the bottom of the mail and look for some weird random characters. This is what the actual signature looks like, but of course, the only way to really authenticate the mail is to use the sender's public key to verify that the random characters are a real signature. --[[User:BKA|BKA]] ([[User talk:BKA|talk]]) 12:19, 4 March 2013 (UTC) | ||
Line 34: | Line 27: | ||
Incidentally nearly EVERYONE has seen a public key verified message. Visit any https website, and odds are the web browser not only established a secure channel through asymmetric (public key) encryption, but also verifies the owner of the 'site by checking with places like VeriSign. How many people here have visited their own HTTPS 'site, (while playing around with a server, for instance,) and had their browser pop up a warning about the 'site being unverified? [[Special:Contributions/156.110.38.82|156.110.38.82]] 14:50, 4 March 2013 (UTC) | Incidentally nearly EVERYONE has seen a public key verified message. Visit any https website, and odds are the web browser not only established a secure channel through asymmetric (public key) encryption, but also verifies the owner of the 'site by checking with places like VeriSign. How many people here have visited their own HTTPS 'site, (while playing around with a server, for instance,) and had their browser pop up a warning about the 'site being unverified? [[Special:Contributions/156.110.38.82|156.110.38.82]] 14:50, 4 March 2013 (UTC) | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |