Anyway, more to the point. As I don't really trust that devices as much
as I would my computer for example (I leave it open for people to pick
up etc. etc.), I don't want to store my desktop key on it, in fact, I
don't even want a long lasting (5-10 year) key on it, and would rather
have a key expire every year, or possibly every half a year.
However, I don't want any extra work on the other end, which is to say
that people who have my current public key, wouldn't have to get a new
one every 6 months to a year (obviously that would get annoying, and I
for one certainly wouldn't do it for everyone I correspond with).
So, I was thinking of creating another key, only for mobile email, that
way I can sign it. Then I could sign that key with my main key. Then
upploading it to a public keyserver, and finally signing email I send
with it. That way if anyone ever did want to check the validity of the
key they could always just check it with the keyserver.
This idea still has drawbacks though. Whoever did want to check it
would still have to have to get the latest key every year or so, but at
least they would no it's me without having to meet me in person, etc. etc.
But does anyone have any better ideas? (Or am I just being too paranoid?)
--
~Leif Andersen
I wasn't going to sign the new key with the old key I was using (that
would be really silly), but rather, with the desktop key. (So in other
words, one level of 'photocopy'). Whenever that key would expire, I
would simply sign the new one with the desktop key. (Perhaps I worded
that poorly in my original email).
Either way, I now agree that it's a much better idea to simply have one
mobile, and one desktop key, the mobile one being revocable.
On the other hand, Allen was saying that they wouldn't be able to get my
key without my password. If that's the case (and they actually got good
symmetric encryption based on that password), I would be a little more
comfortable leaving my private key in my phone. On the other hand, I
don't know how apg stores keys, so I'll have to check it out.
(P.S. Your first email had a signature verification failure, although
your second one passed, so I'm going to assume that something wrong in
the technology as your second email implies you also wrote the first).
~Leif Andersen
As for the pass phrase, there are other fundamental flaws with how
asymmetric keys work that would make me more paranoid than hoping the
government doesn't has the capability of determining the key from the
encrypted one stored on the disk. (Which is to say that the entire
thing relies on not being able to find the prime factorisation of
incredibly large numbers, which I'm told will be possible to do in the
near future with new types of computers).
Ah, I guess that explains it. I had actually thought of it, but
thunderbird was saying that they both game from your gmail address,
although the cert said it came from michael at innerthought.us
~Leif Andersen