GNU Info

Info Node: (mailcrypt.info)Verifiable Pseudonyms

(mailcrypt.info)Verifiable Pseudonyms


Next: Remailer Tips Prev: Remailer Security Up: Remailer Support
Enter node , (file) or (file)node

Verifiable Pseudonyms
=====================

   Here is a plausible sequence of operations when using the remailer
support in Mailcrypt:

  1. You create a public/private PGP key pair.  You give it a User ID
     which is your pseudonym.  You upload the public key to the key
     servers or otherwise distribute it.  (Be aware that anyone who
     compromises your account can read the IDs on your secret keyring,
     thus discovering your verifiable pseudonyms.)

  2. You compose an Email message, Email reply, news post, or news
     followup.

  3. You insert your pseudonym with `C-c / p'.

  4. (Optional) You insert your response block with `C-c / b'.

  5. You type `C-c / s' to sign the message.  The `mc-sign' function
     understands pseudonyms.

  6. You type `C-c / r' to rewrite the message for remailing.  (Or use
     `C-u C-c / r' to view each step of the rewriting as it happens.)

  7. You type `C-c C-c' to send the message.


   Now the recipient(s), reading your message through mail or news, can
verify your pseudonymous signature; thus you have started to create a
verifiable pseudonymous identity.  If you use it consistently, it will
develop a reputation of its own.  With Mailcrypt, using a pseudonym is
almost as easy as using your real name (and your followups in news will
even thread properly).  Welcome to the new age of letters...


automatically generated by info2www version 1.2.2.9