3.9: Verifiable Pseudonyms
Here is a plausible sequence of operations when using the remailer
support in Mailcrypt:
You create a public/private PGP key pair. You give it a User ID which
is your pseudonym. You upload the public key to the key servers or
otherwise distribute it. (Be aware that anyone who compromises your
account can read the IDs on your secret keyring, thus discovering your
You compose an Email message, Email reply, news post, or news followup.
You insert your pseudonym with C-c / p.
(Optional) You insert your response block with C-c / b.
You type C-c / s to sign the message. The
You type C-c / r to rewrite the message for remailing. (Or use
C-u C-c / r to view each step of the rewriting as it happens.)
You type C-c C-c to send the message.
Now the recipient(s), reading your message through mail or news, can
verify your pseudonymous signature; thus you have started to create a
verifiable pseudonymous identity. If you use it consistently, it will
develop a reputation of its own. With Mailcrypt, using a pseudonym is
almost as easy as using your real name (and your followups in news
will even thread properly). Welcome to the new age of letters...