summaryrefslogtreecommitdiff
path: root/content/entry/re-dkim-show-your-privates.md
diff options
context:
space:
mode:
authorNicholas Johnson <mail@nicholasjohnson.ch>2025-02-06 00:00:00 +0000
committerNicholas Johnson <mail@nicholasjohnson.ch>2025-02-06 00:00:00 +0000
commitff1335e5a2a8a14b1638cb747d4e537c64fcacf69ad968179ce0a9d363c3df39 (patch)
treeb0d5a6d5c907b3bc574861df9e220fd4b5b0c15f5d5cb58a19c233d89be611a7 /content/entry/re-dkim-show-your-privates.md
parentf61eebaba70ce040c0e6943ada0455bcd2678ce2f8a53dd1ac5bc9e963383b7d (diff)
downloadjournal-ff1335e5a2a8a14b1638cb747d4e537c64fcacf69ad968179ce0a9d363c3df39.tar.gz
journal-ff1335e5a2a8a14b1638cb747d4e537c64fcacf69ad968179ce0a9d363c3df39.zip
Fix word repetition errors
Diffstat (limited to 'content/entry/re-dkim-show-your-privates.md')
-rw-r--r--content/entry/re-dkim-show-your-privates.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/content/entry/re-dkim-show-your-privates.md b/content/entry/re-dkim-show-your-privates.md
index a3144ff..7176843 100644
--- a/content/entry/re-dkim-show-your-privates.md
+++ b/content/entry/re-dkim-show-your-privates.md
@@ -4,7 +4,7 @@ date: 2023-03-15T00:00:00
tags: ['computing']
draft: false
---
-I recently read Ryan Castellucci's blog post, "[DKIM: Show Your Privates](https://rya.nc/dkim-privates.html)". The problem Ryan points out is that DKIM, which signs outgoing emails as a way to to reduce spam, has a negative unintended consequence: it's harder to deny that you sent an email if it gets leaked. As Ryan points out, saner messaging protocols like [OTR](https://en.wikipedia.org/wiki/Off-the-Record_Messaging) and the [Double Ratchet Algorithm](https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm) do implement cryptographic deniability of messages.
+I recently read Ryan Castellucci's blog post, "[DKIM: Show Your Privates](https://rya.nc/dkim-privates.html)". The problem Ryan points out is that DKIM, which signs outgoing emails as a way to reduce spam, has a negative unintended consequence: it's harder to deny that you sent an email if it gets leaked. As Ryan points out, saner messaging protocols like [OTR](https://en.wikipedia.org/wiki/Off-the-Record_Messaging) and the [Double Ratchet Algorithm](https://en.wikipedia.org/wiki/Double_Ratchet_Algorithm) do implement cryptographic deniability of messages.
There is a way to mitigate the loss of cryptographic deniability in email. You simply rotate DKIM keys, invalidating the old one and publishing its private part. The point of publishing the private part is that any leaked emails which were signed with that key could be forged. Thus, one can deny past emails signed with that key.