On Tue, Jun 16, 2009 at 08:18:28AM -0600, Richard Johnson wrote: > The people behind the address (it's an email reflector) all have their own > gpg and pgp keys [1]. The best way to handle this is to have the e-mail reflector do it. The e-mail reflector should provide a public key to which you encrypt the mail, then it decrypts and re-encrypts to all the subscribers. The "best" part of this is that the subscribers don't need to have everyone else's keys. One such list management software is here: http://www.synacklabs.net/projects/crypt-ml/ It may be worth trying to get the manager of your mailing list to move to this software, or similar. Of course, in the general case, one would argue that exchanging encrypted mail with people you do not know (and therefore can not possibly trust) is rather pointless... If your group has anything truly worth encrypting, it's rather likely that it will be infiltrated by exactly the sort of person you're trying to protect it from. It may be true that the list manager has a list of recipients, but there's no guarantee that the list owner knows who the e-mail addresses actually belong to, or cares. -- Derek D. Martin http://www.pizzashack.org/ GPG Key ID: 0xDFBEAD02 -=-=-=-=- This message is posted from an invalid address. Replying to it will result in undeliverable mail due to spam prevention. Sorry for the inconvenience.
Attachment:
pgpAU4MEPE4Ej.pgp
Description: PGP signature