MSGID: 2:221/360.0 5e0f69ce   
   REPLY: 2:280/464 5e0f577c   
   PID: JamNNTPd/OS2 1.3 20191208   
   TID: GE/2 1.2   
   CHRS: UTF-8 2   
   TZUTC: 0200   
   On 03/01/2020 10:02 a.m., Wilfred van Velzen : August Abolins wrote:   
      
   Hello Wilfred!   
      
    WvV> I can now verify your message had a correct signature made with   
    WvV> this key:   
      
    WvV> wilfred@wilnux5: ~/tmp> gpg -- import aug.key gpg: key   
    WvV> 5789589B: public key "August Abolins   
    WvV> " imported gpg: Total number   
    WvV> processed: 1 gpg: imported: 1 (RSA: 1) wilfred@wilnux5   
      
   Cool! I still have to learn how to do that here.   
      
   I have used the pgp signing process in the long ago past, but now and I am   
   rusty and have only begun figuring out "the process" to use in this new   
   environment.   
      
   I like the Enigmail/OpenPGP integration in Thunderbird.   
      
   When pgp first came out found, I found it fascinating. I immediately wondered   
   why *wouldn't* anyone want to use it on a regular basic for email exchanges.    
   But at that time, using it required complex extra manual steps - especially   
   for decrypting. Looks like this TB/OpenPGP/Enigmail integration can decrypt   
   automatically.   
      
   But email became a horrible monster filled with html codes, graphics, and many   
   fancy things that people have been mesmerized with. It would be too   
   inconvenient to decrypt that each and every time, I guess.   
      
   I think my old public key is still out there. (I have not really looked for it   
   though. I don't remember the servers I used.) The private key is probably   
   still on a 3½ diskette, somewhere.   
      
      
    WvV> The trust thing is sort of an issue. I can't just sign your key   
    WvV> (technically I could of course), because I can't verify it's   
    WvV> really you. Anyone could login to Tommy's nntp server   
    WvV> as 'August Abolins'. and "fake" email addresses are also easy   
    WvV> to create/get. And since you are not a node we can't even   
    WvV> exchange some crash netmails...   
      
   Well.. there *is* the email clue above. ;) A few email exchanges, and the   
   analysis of the headers could be one way to get confidence whether the email I   
   claim to use above is really me or suspicious.   
      
   There is still a trust issue in this whole process for sure. At least one   
   other person who could actually vouch that I am who I am would be needed.   
      
   W.r.t nntp, another "August Abolins" could come from many different outside   
   systems. True. But since registering on Tommi's system requires human   
   intervention, I don't think he would permit another me to register on his   
   system with exactly the same FN LN. So, technically you could be confident   
   that once you grab my public key from here, future correspondences are from   
   "the August Abolins originally seen on Tommi's system." ? :)   
      
   As a minimum, if Tommi were to sign my key, (since my messages are originating   
   on *his* system, and we can be sure that he's the *real deal* operating his   
   *own* system, and I had to be registered manually to have access) then that   
   would be a nice vote of confidence.   
      
   There is another verification process I can suggest. I'll cover that later.    
   And maybe I'll encrypt that message!    
      
   Cheers!   
    ../|ug   
      
   --- Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101    
   hunderbird/60.9.1   
    * Origin: nntp://rbb.fidonet.fi - Lake Ylo - Finland (2:221/360.0)   
   SEEN-BY: 1/123 19/10 90/1 221/0 1 6 360 227/114 229/426 1014 240/5832   
   SEEN-BY: 249/206 317 400 280/464 5003 292/854 8125 317/3 322/757 335/364   
   SEEN-BY: 342/200 423/81   
   PATH: 221/360 1 292/854 229/426   
      
|