Let me start this out by killing any speculation this post might raise: no, this has nothing to do with work. I am not doing anything related to GMail right now, nor do I know anyone working on GMail. Anything I write here should in no way be affiliated with Google.
Having said that, here are my thoughts: after talking to
sneaselcouth about it recently, I've
(
Read more... )
Comments 6
Reply
Reply
Reply
On the other hand, more of what you're talking about has been done than you think: there are already large repositories of keys (they're called, obviously enough, "keyservers", and pgp.mit.edu is probably the best-known), and the PGP command-line clients will interface seamlessly. (My Mutt config is smart enough to recognize that a message has been signed by a key it doesn't have, go retrieve that key, then re-try verifying the message, for example)
I think this will catch on as a side-effect of cryptography in instant messages: people will discover that using OTR plugins is easy, and then they'll wonder "why can't I do that in e-mail?"
Assuming you've got a keyserver configured (see the GPG howto...), signing a key goes like this:
% gpg --recv-keys # (I _think_ it's recv-keys)
% gpg --fingerprint
(make sure it matches...)
% gpg --sign-key
% gpg --send-key
Occasionally, remember to do % gpg --refresh-keys to see if anybody else has ( ... )
Reply
Reply
Your comment raises a few questions for me: why do you think email cryptography will catch on after IM cryptography? I've always thought it would be the other way around. There are easily understandable reasons for getting email cryptography. Why would most people want to encrypt their IMs? Also, why do you think that getting a good global PKI would be so hard? I don't think it would be any harder than getting a hydrogen economy, which has already started to happen (albeit very slowly). Once we get a critical mass of people using it, I expect others will want to join in.
Reply
Leave a comment