|
| ▲ | OhMeadhbh an hour ago | parent | next [-] |
| wow. that's a phenomenally bad policy. There are many legit critiques which can be leveled at PGP, depending on your use case. [Open]PGP is not a silver bullet. You have to use it correctly. |
|
| ▲ | ddtaylor 8 hours ago | parent | prev [-] |
| Before my arrest (CFAA) I operated on Tor and PGP for years. I had property seized and I had a long look at my discovery material, as I was curious which elements they had obtained. I never saw a single speck of anything I ever sent to anyone via PGP in there. They had access to my SIGAINT e-mail and my BitMessage unlocked, but I used PGP for everything on top of that. Stay safe! |
| |
| ▲ | OhMeadhbh 42 minutes ago | parent | next [-] | | if you sign PGP messages with a key you associated with your identity, the have high confidence you sent emails signed with that key. i.e. - PGP does not offer group deniable signatures as a default option. | |
| ▲ | michaelmcdonald 6 hours ago | parent | prev [-] | | Would be curious to know (if you're willing to share) how you were found if you were working to obscure / encrypt your communications. What _was_ it that ultimately gave you away or allowed them to ID you? |
|