nanog mailing list archives
Re: opportunistic email encryption by the MTA (not MUA)
From: "Brian J. Murrell" <brian () interlinx bc ca>
Date: Fri, 15 Jan 2021 11:42:53 -0500
On Fri, 2021-01-15 at 10:26 -0500, Bryan Fields wrote:
It's still stored unencrypted on the server, and the admin can see all.
This is true. I was just referring to transit leakage.
If you want it secure, you have to run gpg and encrypt the body.
Again, true. Cheers, b.
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- opportunistic email encryption by the MTA (not MUA) Randy Bush (Jan 15)
- Re: opportunistic email encryption by the MTA (not MUA) Brian J. Murrell (Jan 15)
- Re: opportunistic email encryption by the MTA (not MUA) Bryan Fields (Jan 15)
- Re: opportunistic email encryption by the MTA (not MUA) Brian J. Murrell (Jan 15)
- Re: tiny gorillas, was opportunistic email encryption by the MTA (not MUA) John Levine (Jan 15)
- Re: opportunistic email encryption by the MTA (not MUA) Rich Kulawiec (Jan 16)
- Re: opportunistic email encryption by the MTA (not MUA) Bryan Fields (Jan 15)
- Message not available
- Re: opportunistic email encryption by the MTA (not MUA) Randy Bush (Jan 15)
- Re: opportunistic email encryption by the MTA (not MUA) Brian J. Murrell (Jan 15)