|
From: | Frank Villaro-Dixon |
Subject: | Re: [Sks-devel] Encrypt.to searching for beta users |
Date: | Mon, 9 Dec 2013 13:20:00 +0100 |
User-agent: | Mutt/1.5.22 (2013-10-16) |
On 13-12-09 12:56:09, Stephan Seitz, wrote 2.6K characters saying:
Hi there,
Hi,
I'm of the same opinion as Stephan. Even if this service is maybe good as-is, it could easily mislead the user into thinking that what he does is secure. The user doesn't know that the message has been encrypted with the end-user's key, and not with a MITM one. It may do more harm than good; IDK, just an opinion.Am Samstag, den 07.12.2013, 13:27 +0100 schrieb PGP Key Admin:We love PGP! :-)so I do. But, why are you going to use it in such a ummm grotesque flavour? If one's using that service he/she has to trust your service and toolchain. It's completele breaking any ideas of end-to-end encryption. More worse, any enduser without deeper knowledge of pgp or encryption at all will be misguided and could think his communication be secured. Indeed it isn't.
Also, I hope you're not running an "open-relay" server, and that you have some kind of mail-sending policy ;).
We would like to make PGP as usable as possible for everyone. With https://encrypt.to you can send encrypted messages to PGP users and you can receive encrypted messages from non-PGP users. We are using client side encryption and we can't decrypt the message. How does it work? When your public key is added to a sks keyserver just open the link: Many thanks in advance for your feedback. Jan
Frank -- frank.villaro-dixon.eu - PGP: 6F36914A Envie d'électricité 100% verte ? Enercoop.fr What is a Velomobile ? www.sans-essence.eu
pgpubaXE7QgSV.pgp
Description: PGP signature
[Prev in Thread] | Current Thread | [Next in Thread] |