diff options
Diffstat (limited to 'content/entry/re-dkim-show-your-privates.md')
-rw-r--r-- | content/entry/re-dkim-show-your-privates.md | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/content/entry/re-dkim-show-your-privates.md b/content/entry/re-dkim-show-your-privates.md index cceef82..3aac7b1 100644 --- a/content/entry/re-dkim-show-your-privates.md +++ b/content/entry/re-dkim-show-your-privates.md @@ -1,6 +1,7 @@ --- title: "Re: DKIM: Show Your Privates" date: 2023-03-15T00:00:00 +tags: ['computing'] draft: false --- I recently read Ryan Castellucci's blog post, "[DKIM: Show Your Privates](https://rya.nc/dkim-privates.html)". The problem Ryan points out is that DKIM, which signs outgoing emails as a way to to reduce spam, has a negative unintended consequence: it's harder to deny that you sent an email if it gets leaked. As Ryan points out, saner messaging protocols like [OTR](https://www.wikipedia.org/wiki/Off-the-Record_Messaging) and the [Double Ratchet Algorithm](https://www.wikipedia.org/wiki/Double_Ratchet_Algorithm) do implement cryptographic deniability of messages. |