summaryrefslogtreecommitdiff
path: root/content/entry/re-dkim-show-your-privates.md
diff options
context:
space:
mode:
authorNicholas Johnson <nick@nicholasjohnson.ch>2023-08-24 00:00:00 +0000
committerNicholas Johnson <nick@nicholasjohnson.ch>2023-08-24 00:00:00 +0000
commit62ce2c3a30726734f4bd9e92e0f5db27612e0d15ee0cd0eb6c106afa96bc56d4 (patch)
tree6dfe5b9b737801cff19ab8f3582e4e661bd81f8b6805523668cfb992e8b1cd59 /content/entry/re-dkim-show-your-privates.md
parentebf93de89918056d8c52f3624baa548d6286fae57ede67a0ad735e427eb01155 (diff)
downloadjournal-62ce2c3a30726734f4bd9e92e0f5db27612e0d15ee0cd0eb6c106afa96bc56d4.tar.gz
journal-62ce2c3a30726734f4bd9e92e0f5db27612e0d15ee0cd0eb6c106afa96bc56d4.zip
Add tag 'computing'
Diffstat (limited to 'content/entry/re-dkim-show-your-privates.md')
-rw-r--r--content/entry/re-dkim-show-your-privates.md1
1 files changed, 1 insertions, 0 deletions
diff --git a/content/entry/re-dkim-show-your-privates.md b/content/entry/re-dkim-show-your-privates.md
index cceef82..3aac7b1 100644
--- a/content/entry/re-dkim-show-your-privates.md
+++ b/content/entry/re-dkim-show-your-privates.md
@@ -1,6 +1,7 @@
---
title: "Re: DKIM: Show Your Privates"
date: 2023-03-15T00:00:00
+tags: ['computing']
draft: false
---
I recently read Ryan Castellucci's blog post, "[DKIM: Show Your Privates](https://rya.nc/dkim-privates.html)". The problem Ryan points out is that DKIM, which signs outgoing emails as a way to to reduce spam, has a negative unintended consequence: it's harder to deny that you sent an email if it gets leaked. As Ryan points out, saner messaging protocols like [OTR](https://www.wikipedia.org/wiki/Off-the-Record_Messaging) and the [Double Ratchet Algorithm](https://www.wikipedia.org/wiki/Double_Ratchet_Algorithm) do implement cryptographic deniability of messages.